From 34f1abc68281dbf9fd54f67405a34cfe21686099 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 29 Nov 2018 02:20:02 -0500 Subject: [PATCH] - Synchronized data. --- 2018/19xxx/CVE-2018-19661.json | 48 ++++++++++++++++++++++++-- 2018/19xxx/CVE-2018-19662.json | 48 ++++++++++++++++++++++++-- 2018/19xxx/CVE-2018-19664.json | 48 ++++++++++++++++++++++++-- 2018/19xxx/CVE-2018-19665.json | 18 ++++++++++ 2018/19xxx/CVE-2018-19666.json | 62 ++++++++++++++++++++++++++++++++++ 5 files changed, 218 insertions(+), 6 deletions(-) create mode 100644 2018/19xxx/CVE-2018-19665.json create mode 100644 2018/19xxx/CVE-2018-19666.json diff --git a/2018/19xxx/CVE-2018-19661.json b/2018/19xxx/CVE-2018-19661.json index d05cfe4982f..4568ab6cd9a 100644 --- a/2018/19xxx/CVE-2018-19661.json +++ b/2018/19xxx/CVE-2018-19661.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-19661", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An issue was discovered in libsndfile 1.0.28. There is a buffer over-read in the function i2ulaw_array in ulaw.c that will lead to a denial of service." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/erikd/libsndfile/issues/429", + "refsource" : "MISC", + "url" : "https://github.com/erikd/libsndfile/issues/429" } ] } diff --git a/2018/19xxx/CVE-2018-19662.json b/2018/19xxx/CVE-2018-19662.json index b0e2bf99922..0fc1fb20520 100644 --- a/2018/19xxx/CVE-2018-19662.json +++ b/2018/19xxx/CVE-2018-19662.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-19662", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An issue was discovered in libsndfile 1.0.28. There is a buffer over-read in the function i2alaw_array in alaw.c that will lead to a denial of service." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/erikd/libsndfile/issues/429", + "refsource" : "MISC", + "url" : "https://github.com/erikd/libsndfile/issues/429" } ] } diff --git a/2018/19xxx/CVE-2018-19664.json b/2018/19xxx/CVE-2018-19664.json index 2a602a7c352..d8b208583be 100644 --- a/2018/19xxx/CVE-2018-19664.json +++ b/2018/19xxx/CVE-2018-19664.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-19664", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "libjpeg-turbo 2.0.1 has a heap-based buffer over-read in the put_pixel_rows function in wrbmp.c, as demonstrated by djpeg." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/305", + "refsource" : "MISC", + "url" : "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/305" } ] } diff --git a/2018/19xxx/CVE-2018-19665.json b/2018/19xxx/CVE-2018-19665.json new file mode 100644 index 00000000000..3e9d4bcca66 --- /dev/null +++ b/2018/19xxx/CVE-2018-19665.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19665", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19666.json b/2018/19xxx/CVE-2018-19666.json new file mode 100644 index 00000000000..47a18dff24e --- /dev/null +++ b/2018/19xxx/CVE-2018-19666.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19666", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "The agent in OSSEC through 3.1.0 on Windows allows local users to gain NT AUTHORITY\\SYSTEM access via Directory Traversal by leveraging full access to the associated OSSEC server." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/ossec/ossec-hids/issues/1585", + "refsource" : "MISC", + "url" : "https://github.com/ossec/ossec-hids/issues/1585" + } + ] + } +}