{ "CVE_data_meta": { "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010057", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "nfdump", "product": { "product_data": [ { "product_name": "nfdump", "version": { "version_data": [ { "version_value": "\u2264 1.6.16 [fixed: after commit 9f0fe9563366f62a71d34c92229da3432ec5cf0e]" } ] } } ] } } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "nfdump 1.6.16 and earlier is affected by: Buffer Overflow. The impact is: The impact could range from a denial of service to local code execution. The component is: nfx.c:546, nffile_inline.c:83, minilzo.c (redistributed). The attack vector is: nfdump must read and process a specially crafted file. The fixed version is: after commit 9f0fe9563366f62a71d34c92229da3432ec5cf0e." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "url": "https://github.com/phaag/nfdump/issues/104", "refsource": "MISC", "name": "https://github.com/phaag/nfdump/issues/104" }, { "refsource": "FEDORA", "name": "FEDORA-2019-0fbfb00cbb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULSZMKA7P7REJMANVL7D6WMZ2L7IRSET/" }, { "refsource": "FEDORA", "name": "FEDORA-2019-9013b5e75d", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTONOGJU5FSMFNRCT6OHXYUMDRKH4RPA/" }, { "refsource": "GENTOO", "name": "GLSA-202003-17", "url": "https://security.gentoo.org/glsa/202003-17" }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20200926 [SECURITY] [DLA 2383-1] nfdump security update", "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00021.html" } ] } }