### [CVE-2019-3560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3560) ![](https://img.shields.io/static/v1?label=Product&message=fizz&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=!%3D%3E%20v2019.03.04.00%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Loop%20with%20Unreachable%20Exit%20Condition%20(CWE-835)&color=brighgreen) ### Description An improperly performed length calculation on a buffer in PlaintextRecordLayer could lead to an infinite loop and denial-of-service based on user input. This issue affected versions of fizz prior to v2019.03.04.00. ### POC #### Reference - http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html - http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html #### Github - https://github.com/0dayhunter/Facebook-BugBounty-Writeups - https://github.com/ARPSyndicate/cvemon - https://github.com/Krishnathakur063/Facebook-BugBounty-Writeup - https://github.com/SummerSec/learning-codeql - https://github.com/github/securitylab - https://github.com/jaiswalakshansh/Facebook-BugBounty-Writeups - https://github.com/khulnasoft-lab/SecurityLab - https://github.com/lennysec/awesome-tls-hacks - https://github.com/lnick2023/nicenice - https://github.com/paulveillard/cybersecurity-tls-security - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/xbl3/awesome-cve-poc_qazbnm456