From 5bb648a343908f47fee9797a2474327000a6c939 Mon Sep 17 00:00:00 2001 From: zdi-team Date: Wed, 29 May 2019 16:38:27 -0500 Subject: [PATCH] ZDI assigns the following Malwarebytes CVE: M 2019/6xxx/CVE-2019-6739.json --- 2019/6xxx/CVE-2019-6739.json | 81 +++++++++++++++++++++++++++++------- 1 file changed, 65 insertions(+), 16 deletions(-) diff --git a/2019/6xxx/CVE-2019-6739.json b/2019/6xxx/CVE-2019-6739.json index 371956d1327..dddcdd2b169 100644 --- a/2019/6xxx/CVE-2019-6739.json +++ b/2019/6xxx/CVE-2019-6739.json @@ -1,18 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6739", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2019-6739", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Antimalware", + "version": { + "version_data": [ + { + "version_value": "3.6.1.2711" + } + ] + } + } + ] + }, + "vendor_name": "Malwarebytes" + } + ] } -} \ No newline at end of file + }, + "credit": "rgod of 9sg Security Team - rgod@9sgsec.com", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Malwarebytes Antimalware 3.6.1.2711. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.\n\nThere is an issue with the way the product handles URIs within certain schemes. The product does not warn the user that a dangerous navigation is about to take place. Because special characters in the URI are not sanitized, this could lead to the execution of arbitrary commands. An attacker can leverage this vulnerability to execute code in the context of the current user at medium integrity.\n Was ZDI-CAN-7162." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-223/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } + } +}