ID

VAR-201906-0407


CVE

CVE-2019-6963


TITLE

RDK RDKB CcspPandM Module buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-005798

DESCRIPTION

A heap-based buffer overflow in cosa_dhcpv4_dml.c in the RDK RDKB-20181217-1 CcspPandM module may allow attackers with login credentials to achieve remote code execution by crafting a long buffer in the "Comment" field of an IP reservation form in the admin panel. This is related to the CcspCommonLibrary module. RDK RDKB CcspPandM The module contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. RDK is a set of modular, portable, and customizable open source IoT software solutions for the RDK Management community. CcspPandM is one of the modules used to implement the core configuration and management functions of the device. A buffer error vulnerability exists in the cosa_dhcpv4_dml.c file of the CcspPandM module in the RDK RDKB-20181217-1 version. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow

Trust: 2.7

sources: NVD: CVE-2019-6963 // JVNDB: JVNDB-2019-005798 // CNVD: CNVD-2019-19286 // CNNVD: CNNVD-201906-820

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-19286

AFFECTED PRODUCTS

vendor:rdkcentralmodel:rdkb ccsppandmscope:eqversion:rdkb-20181217-1

Trust: 1.0

vendor:rdk managementmodel:rdkb ccsppandmscope:eqversion:rdkb-20181217-1

Trust: 0.8

vendor:rdkmodel:rdkb-20181217-1scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-19286 // JVNDB: JVNDB-2019-005798 // NVD: CVE-2019-6963

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6963
value: HIGH

Trust: 1.0

NVD: CVE-2019-6963
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-19286
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201906-820
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2019-6963
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-19286
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-6963
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-19286 // JVNDB: JVNDB-2019-005798 // CNNVD: CNNVD-201906-820 // NVD: CVE-2019-6963

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-119

Trust: 0.8

sources: JVNDB: JVNDB-2019-005798 // NVD: CVE-2019-6963

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201906-820

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201906-820

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-005798

PATCH

title:rdkcmf/rdkb-CcspPandMurl:https://github.com/rdkcmf/rdkb-CcspPandM

Trust: 0.8

title:Patch for RDK CcspPandM Module Buffer Overflow Vulnerability (CNVD-2019-19286)url:https://www.cnvd.org.cn/patchInfo/show/165303

Trust: 0.6

title:RDK CcspPandM Fixes for module buffer error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93969

Trust: 0.6

sources: CNVD: CNVD-2019-19286 // JVNDB: JVNDB-2019-005798 // CNNVD: CNNVD-201906-820

EXTERNAL IDS

db:NVDid:CVE-2019-6963

Trust: 3.0

db:JVNDBid:JVNDB-2019-005798

Trust: 0.8

db:CNVDid:CNVD-2019-19286

Trust: 0.6

db:CNNVDid:CNNVD-201906-820

Trust: 0.6

sources: CNVD: CNVD-2019-19286 // JVNDB: JVNDB-2019-005798 // CNNVD: CNNVD-201906-820 // NVD: CVE-2019-6963

REFERENCES

url:https://dojo.bullguard.com/dojo-by-bullguard/blog/the-gateway-is-wide-open

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-6963

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6963

Trust: 0.8

sources: CNVD: CNVD-2019-19286 // JVNDB: JVNDB-2019-005798 // CNNVD: CNNVD-201906-820 // NVD: CVE-2019-6963

SOURCES

db:CNVDid:CNVD-2019-19286
db:JVNDBid:JVNDB-2019-005798
db:CNNVDid:CNNVD-201906-820
db:NVDid:CVE-2019-6963

LAST UPDATE DATE

2024-11-23T22:37:47.880000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-19286date:2019-06-26T00:00:00
db:JVNDBid:JVNDB-2019-005798date:2019-07-01T00:00:00
db:CNNVDid:CNNVD-201906-820date:2020-08-25T00:00:00
db:NVDid:CVE-2019-6963date:2024-11-21T04:47:18.853

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-19286date:2019-06-26T00:00:00
db:JVNDBid:JVNDB-2019-005798date:2019-07-01T00:00:00
db:CNNVDid:CNNVD-201906-820date:2019-06-20T00:00:00
db:NVDid:CVE-2019-6963date:2019-06-20T14:15:11.173