CVE-2019-18197

Current Description

In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.

Basic Data

PublishedOctober 18, 2019
Last ModifiedMay 29, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-416
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityHIGH
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.1
SeverityMEDIUM
Exploitability Score4.9
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • AND
    • OR - Configuration 1
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3ApplicationXmlsoftLibxslt1.1.33*******
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3OSLinuxLinux Kernel-*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSCanonicalUbuntu Linux12.04***esm***
    2.3OSCanonicalUbuntu Linux14.04***esm***
    2.3OSCanonicalUbuntu Linux16.04***lts***
    2.3OSCanonicalUbuntu Linux18.04***lts***
    2.3OSCanonicalUbuntu Linux19.04*******
    2.3OSCanonicalUbuntu Linux19.10*******
    2.3OSDebianDebian Linux8.0*******

Vulnerable Software List

VendorProductVersions
Xmlsoft Libxslt 1.1.33
Debian Debian Linux 8.0
Canonical Ubuntu Linux 12.04, 14.04, 16.04, 18.04, 19.04, 19.10

References

NameSourceURLTags
openSUSE-SU-2020:0189http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.htmlSUSE
openSUSE-SU-2020:0210http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.htmlSUSE
openSUSE-SU-2020:0233http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.htmlSUSE
openSUSE-SU-2020:0731http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.htmlSUSE
[oss-security] 20191117 Nokogiri security update v1.10.5http://www.openwall.com/lists/oss-security/2019/11/17/2MLISTMailing List Third Party Advisory
RHSA-2020:0514https://access.redhat.com/errata/RHSA-2020:0514REDHAT
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15746https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15746MISCIssue Tracking Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15768https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15768MISCIssue Tracking Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15914https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15914MISCIssue Tracking Third Party Advisory
https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285MISCPatch Third Party Advisory
[debian-lts-announce] 20191027 [SECURITY] [DLA 1973-1] libxslt security updatehttps://lists.debian.org/debian-lts-announce/2019/10/msg00037.htmlMLISTThird Party Advisory
https://security.netapp.com/advisory/ntap-20191031-0004/https://security.netapp.com/advisory/ntap-20191031-0004/CONFIRMThird Party Advisory
https://security.netapp.com/advisory/ntap-20200416-0004/https://security.netapp.com/advisory/ntap-20200416-0004/CONFIRM
USN-4164-1https://usn.ubuntu.com/4164-1/UBUNTUThird Party Advisory
N/Ahttps://www.oracle.com/security-alerts/cpuapr2020.htmlN/A