From 46d39fb422bc2135829be388373345ed1bd3a576 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 9 Oct 2019 21:01:17 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/16xxx/CVE-2018-16585.json | 7 +++- 2019/14xxx/CVE-2019-14835.json | 5 +++ 2019/15xxx/CVE-2019-15014.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15015.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15016.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15017.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15018.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15019.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15020.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15021.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15022.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15023.json | 62 ++++++++++++++++++++++++++++++++++ 2019/1xxx/CVE-2019-1584.json | 58 +++++++++++++++++++++++++++---- 2019/5xxx/CVE-2019-5045.json | 58 +++++++++++++++++++++++++++---- 2019/5xxx/CVE-2019-5046.json | 58 +++++++++++++++++++++++++++---- 2019/5xxx/CVE-2019-5047.json | 58 +++++++++++++++++++++++++++---- 2019/5xxx/CVE-2019-5048.json | 58 +++++++++++++++++++++++++++---- 2019/5xxx/CVE-2019-5050.json | 58 +++++++++++++++++++++++++++---- 2019/5xxx/CVE-2019-5053.json | 58 +++++++++++++++++++++++++++---- 19 files changed, 988 insertions(+), 50 deletions(-) create mode 100644 2019/15xxx/CVE-2019-15014.json create mode 100644 2019/15xxx/CVE-2019-15015.json create mode 100644 2019/15xxx/CVE-2019-15016.json create mode 100644 2019/15xxx/CVE-2019-15017.json create mode 100644 2019/15xxx/CVE-2019-15018.json create mode 100644 2019/15xxx/CVE-2019-15019.json create mode 100644 2019/15xxx/CVE-2019-15020.json create mode 100644 2019/15xxx/CVE-2019-15021.json create mode 100644 2019/15xxx/CVE-2019-15022.json create mode 100644 2019/15xxx/CVE-2019-15023.json diff --git a/2018/16xxx/CVE-2018-16585.json b/2018/16xxx/CVE-2018-16585.json index e6552dd95c3..5e10ea97234 100644 --- a/2018/16xxx/CVE-2018-16585.json +++ b/2018/16xxx/CVE-2018-16585.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "** DISPUTED **" + "value": "** DISPUTED ** An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193)." } ] }, @@ -86,6 +86,11 @@ "name": "https://seclists.org/oss-sec/2018/q3/182", "refsource": "MISC", "url": "https://seclists.org/oss-sec/2018/q3/182" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1626193", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1626193" } ] } diff --git a/2019/14xxx/CVE-2019-14835.json b/2019/14xxx/CVE-2019-14835.json index f8ed5ae0a9b..35243b96086 100644 --- a/2019/14xxx/CVE-2019-14835.json +++ b/2019/14xxx/CVE-2019-14835.json @@ -208,6 +208,11 @@ "refsource": "MLIST", "name": "[oss-security] 20191009 Re: CVE-2019-14835: QEMU-KVM Guest to Host Kernel Escape Vulnerability: vhost/vhost_net kernel buffer overflow", "url": "http://www.openwall.com/lists/oss-security/2019/10/09/3" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20191009 Re: CVE-2019-14835: QEMU-KVM Guest to Host Kernel Escape Vulnerability: vhost/vhost_net kernel buffer overflow", + "url": "http://www.openwall.com/lists/oss-security/2019/10/09/7" } ] }, diff --git a/2019/15xxx/CVE-2019-15014.json b/2019/15xxx/CVE-2019-15014.json new file mode 100644 index 00000000000..2252464c8cf --- /dev/null +++ b/2019/15xxx/CVE-2019-15014.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15014", + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Palo Alto Networks Zingbox Inspector", + "version": { + "version_data": [ + { + "version_value": "Zingbox Inspector, versions 1.286 and earlier." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/167", + "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/167" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A command injection vulnerability exists in the Zingbox Inspector versions 1.286 and earlier, that allows for an authenticated user to execute arbitrary system commands in the CLI." + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15015.json b/2019/15xxx/CVE-2019-15015.json new file mode 100644 index 00000000000..1c32e5f9f88 --- /dev/null +++ b/2019/15xxx/CVE-2019-15015.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15015", + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Palo Alto Networks Zingbox Inspector", + "version": { + "version_data": [ + { + "version_value": "Zingbox Inspector, versions 1.294 and earlier." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use of Hard-coded Credentials" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/170", + "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/170" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Zingbox Inspector, versions 1.294 and earlier, hardcoded credentials for root and inspector user accounts are present in the system software, which can result in unauthorized users gaining access to the system." + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15016.json b/2019/15xxx/CVE-2019-15016.json new file mode 100644 index 00000000000..68017263731 --- /dev/null +++ b/2019/15xxx/CVE-2019-15016.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15016", + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Palo Alto Networks Zingbox Inspector", + "version": { + "version_data": [ + { + "version_value": "Zingbox Inspector, versions 1.288 and earlier." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/173", + "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/173" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An SQL injection vulnerability exists in the management interface of Zingbox Inspector versions 1.288 and earlier, that allows for unsanitized data provided by an authenticated user to be passed from the web UI into the database." + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15017.json b/2019/15xxx/CVE-2019-15017.json new file mode 100644 index 00000000000..5759f37484b --- /dev/null +++ b/2019/15xxx/CVE-2019-15017.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15017", + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Palo Alto Networks Zingbox Inspector", + "version": { + "version_data": [ + { + "version_value": "Zingbox Inspector, versions 1.294 and earlier." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/176", + "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/176" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The SSH service is enabled on the Zingbox Inspector versions 1.294 and earlier, exposing SSH to the local network. When combined with PAN-SA-2019-0027, this can allow an attacker to authenticate to the service using hardcoded credentials." + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15018.json b/2019/15xxx/CVE-2019-15018.json new file mode 100644 index 00000000000..26ac2516b1c --- /dev/null +++ b/2019/15xxx/CVE-2019-15018.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15018", + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Palo Alto Networks Zingbox Inspector", + "version": { + "version_data": [ + { + "version_value": "Zingbox Inspector, versions 1.280 and earlier." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Authentication Bypass Using an Alternate Path or Channel" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/179", + "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/179" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A security vulnerability exists in the Zingbox Inspector versions 1.280 and earlier, where authentication is not required when binding the Inspector instance to a different customer tenant." + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15019.json b/2019/15xxx/CVE-2019-15019.json new file mode 100644 index 00000000000..2e7b3400b25 --- /dev/null +++ b/2019/15xxx/CVE-2019-15019.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15019", + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Palo Alto Networks Zingbox Inspector", + "version": { + "version_data": [ + { + "version_value": "Zingbox Inspector, versions 1.294 and earlier." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Validation of Integrity Check Value" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/182", + "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/182" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A security vulnerability exists in the Zingbox Inspector versions 1.294 and earlier, that could allow an attacker to supply an invalid software update image to the Zingbox Inspector." + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15020.json b/2019/15xxx/CVE-2019-15020.json new file mode 100644 index 00000000000..dd0cedd1dcd --- /dev/null +++ b/2019/15xxx/CVE-2019-15020.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15020", + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Palo Alto Networks Zingbox Inspector", + "version": { + "version_data": [ + { + "version_value": "Zingbox Inspector, versions 1.293 and earlier." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/185", + "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/185" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A security vulnerability exists in the Zingbox Inspector versions 1.293 and earlier, that could allow an attacker to supply an invalid software update image to the Zingbox Inspector that could result in command injection." + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15021.json b/2019/15xxx/CVE-2019-15021.json new file mode 100644 index 00000000000..8aa2441f25c --- /dev/null +++ b/2019/15xxx/CVE-2019-15021.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15021", + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Palo Alto Networks Zingbox Inspector", + "version": { + "version_data": [ + { + "version_value": "Zingbox Inspector, versions 1.294 and earlier." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Exposure Through Sent Data" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/188", + "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/188" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A security vulnerability exists in the Zingbox Inspector versions 1.294 and earlier, that can allow an attacker to easily identify instances of Zingbox Inspectors in a local area network." + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15022.json b/2019/15xxx/CVE-2019-15022.json new file mode 100644 index 00000000000..a41ea1e34fb --- /dev/null +++ b/2019/15xxx/CVE-2019-15022.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15022", + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Palo Alto Networks Zingbox Inspector", + "version": { + "version_data": [ + { + "version_value": "Zingbox Inspector, versions 1.294 and earlier." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "ARP Spoofing" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/191", + "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/191" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A security vulnerability exists in Zingbox Inspector versions 1.294 and earlier, that allows for the Inspector to be susceptible to ARP spoofing." + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15023.json b/2019/15xxx/CVE-2019-15023.json new file mode 100644 index 00000000000..b28591096fe --- /dev/null +++ b/2019/15xxx/CVE-2019-15023.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15023", + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Palo Alto Networks Zingbox Inspector", + "version": { + "version_data": [ + { + "version_value": "Zingbox Inspector, versions 1.294 and earlier." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cleartext Storage of Sensitive Information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/194", + "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/194" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A security vulnerability exists in Zingbox Inspector versions 1.294 and earlier, that results in passwords for 3rd party integrations being stored in cleartext in device configuration." + } + ] + } +} \ No newline at end of file diff --git a/2019/1xxx/CVE-2019-1584.json b/2019/1xxx/CVE-2019-1584.json index bffaa1f4cc7..93585aac189 100644 --- a/2019/1xxx/CVE-2019-1584.json +++ b/2019/1xxx/CVE-2019-1584.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-1584", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-1584", + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Palo Alto Networks Zingbox Inspector", + "version": { + "version_data": [ + { + "version_value": "Zingbox Inspector, versions 1.293 and earlier." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/164", + "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/164" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A security vulnerability exists in Zingbox Inspector version 1.293 and earlier, that allows for remote code execution if the Inspector were sent a malicious command from the Zingbox cloud, or if the Zingbox Inspector were tampered with to connect to an attacker's cloud endpoint." } ] } diff --git a/2019/5xxx/CVE-2019-5045.json b/2019/5xxx/CVE-2019-5045.json index e94b56582c3..3d3dd3d4e5b 100644 --- a/2019/5xxx/CVE-2019-5045.json +++ b/2019/5xxx/CVE-2019-5045.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-5045", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-5045", + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "NitroPDF", + "version": { + "version_data": [ + { + "version_value": "NitroPDF 12.12.1.522" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap Based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0814", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0814" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A specifically crafted jpeg2000 file embedded in a PDF file can lead to a heap corruption when opening a PDF document in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file." } ] } diff --git a/2019/5xxx/CVE-2019-5046.json b/2019/5xxx/CVE-2019-5046.json index f3e7e40a780..9697be6c38f 100644 --- a/2019/5xxx/CVE-2019-5046.json +++ b/2019/5xxx/CVE-2019-5046.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-5046", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-5046", + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "NitroPDF", + "version": { + "version_data": [ + { + "version_value": "NitroPDF 12.12.1.522" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap Based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0815", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0815" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A specifically crafted jpeg2000 file embedded in a PDF file can lead to a heap corruption when opening a PDF document in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file." } ] } diff --git a/2019/5xxx/CVE-2019-5047.json b/2019/5xxx/CVE-2019-5047.json index 4789d512531..d6720ea0777 100644 --- a/2019/5xxx/CVE-2019-5047.json +++ b/2019/5xxx/CVE-2019-5047.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-5047", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-5047", + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "NitroPDF", + "version": { + "version_data": [ + { + "version_value": "NitroPDF 12.2.1.522" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0816", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0816" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An exploitable Use After Free vulnerability exists in the CharProcs parsing functionality of NitroPDF. A specially crafted PDF can cause a type confusion, resulting in a Use After Free. An attacker can craft a malicious PDF to trigger this vulnerability." } ] } diff --git a/2019/5xxx/CVE-2019-5048.json b/2019/5xxx/CVE-2019-5048.json index 32c1cf80f78..63194543831 100644 --- a/2019/5xxx/CVE-2019-5048.json +++ b/2019/5xxx/CVE-2019-5048.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-5048", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-5048", + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "NitroPDF", + "version": { + "version_data": [ + { + "version_value": "NitroPDF 12.12.1.522" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap Based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0817", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0817" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A specifically crafted PDF file can lead to a heap corruption when opened in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file." } ] } diff --git a/2019/5xxx/CVE-2019-5050.json b/2019/5xxx/CVE-2019-5050.json index e8a316d9a46..d615e95fe8b 100644 --- a/2019/5xxx/CVE-2019-5050.json +++ b/2019/5xxx/CVE-2019-5050.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-5050", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-5050", + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "NitroPDF", + "version": { + "version_data": [ + { + "version_value": "NitroPDF 12.12.1.522" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap Based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0819", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0819" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A specifically crafted PDF file can lead to a heap corruption when opened in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file." } ] } diff --git a/2019/5xxx/CVE-2019-5053.json b/2019/5xxx/CVE-2019-5053.json index 8cbcfcc535e..0e0064e761d 100644 --- a/2019/5xxx/CVE-2019-5053.json +++ b/2019/5xxx/CVE-2019-5053.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-5053", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-5053", + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "NitroPDF", + "version": { + "version_data": [ + { + "version_value": "NitroPDF 12.2.1.522" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0830", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0830" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An exploitable use-after-free vulnerability exists in the Length parsing function of NitroPDF. A specially crafted PDF can cause a type confusion, resulting in a use-after-free condition. An attacker can craft a malicious PDF to trigger this vulnerability." } ] }