"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-06-30 23:00:53 +00:00
parent 64de647fe8
commit a913bb4c59
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
10 changed files with 484 additions and 0 deletions

View File

@ -56,6 +56,11 @@
"url": "https://github.com/gpac/gpac/issues/1249",
"refsource": "MISC",
"name": "https://github.com/gpac/gpac/issues/1249"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190630 [SECURITY] [DLA 1841-1] gpac security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/gpac/gpac/issues/1249",
"refsource": "MISC",
"name": "https://github.com/gpac/gpac/issues/1249"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190630 [SECURITY] [DLA 1841-1] gpac security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/gpac/gpac/issues/1249",
"refsource": "MISC",
"name": "https://github.com/gpac/gpac/issues/1249"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190630 [SECURITY] [DLA 1841-1] gpac security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html"
}
]
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13108",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/Exiv2/exiv2/issues/789",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/issues/789"
},
{
"url": "https://github.com/Exiv2/exiv2/pull/794",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/pull/794"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13109",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/Exiv2/exiv2/issues/790",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/issues/790"
},
{
"url": "https://github.com/Exiv2/exiv2/pull/795",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/pull/795"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13110",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/Exiv2/exiv2/issues/843",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/issues/843"
},
{
"url": "https://github.com/Exiv2/exiv2/pull/844",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/pull/844"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13111",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/Exiv2/exiv2/issues/791",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/issues/791"
},
{
"url": "https://github.com/Exiv2/exiv2/pull/797",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/pull/797"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13112",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/Exiv2/exiv2/issues/845",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/issues/845"
},
{
"url": "https://github.com/Exiv2/exiv2/pull/846",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/pull/846"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13113",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to assertion failure) via an invalid data location in a CRW image file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/Exiv2/exiv2/issues/841",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/issues/841"
},
{
"url": "https://github.com/Exiv2/exiv2/pull/842",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/pull/842"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13114",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/Exiv2/exiv2/issues/793",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/issues/793"
},
{
"url": "https://github.com/Exiv2/exiv2/pull/815",
"refsource": "MISC",
"name": "https://github.com/Exiv2/exiv2/pull/815"
}
]
}
}