{ "id": "CVE-2019-1353", "sourceIdentifier": "secure@microsoft.com", "published": "2020-01-24T22:15:19.253", "lastModified": "2021-01-26T14:47:13.120", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. When running Git in the Windows Subsystem for Linux (also known as \"WSL\") while accessing a working directory on a regular Windows drive, none of the NTFS protections were active." }, { "lang": "es", "value": "El controlador IEC870IP para Vijeo Citect y Citect SCADA de AVENA y Power SCADA Operation de Schneider Electric, presenta una vulnerabilidad de desbordamiento de b\u00fafer que podr\u00eda resultar en un bloqueo del lado del servidor." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.14.0", "versionEndExcluding": "2.14.6", "matchCriteriaId": "CD0FE176-63B7-4176-8319-80CD3D7C524E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.15.0", "versionEndExcluding": "2.15.4", "matchCriteriaId": "7FA79B4D-1A29-4520-ACF7-BBD5B2696ABA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.16.0", "versionEndExcluding": "2.16.6", "matchCriteriaId": "DB018182-B15F-47BC-85FA-6847BB37844A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.17.0", "versionEndExcluding": "2.17.3", "matchCriteriaId": "19CF821B-9ECC-4F6C-B0BC-7361370776C5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.18.0", "versionEndExcluding": "2.18.2", "matchCriteriaId": "84278A89-0D1B-4CFD-9B31-68D8D7327E65" }, { "vulnerable": true, "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.19.0", "versionEndExcluding": "2.19.3", "matchCriteriaId": "7B4FA857-692C-4C00-A170-1F31E6D9563E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.20.0", "versionEndExcluding": "2.20.2", "matchCriteriaId": "BD4C8899-C9E7-4DFC-BE17-D5D67B9B5FFB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.21.0", "versionEndExcluding": "2.21.1", "matchCriteriaId": "4392299F-8DFB-4ADF-BAA8-4415D459E8EE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.22.0", "versionEndExcluding": "2.22.2", "matchCriteriaId": "025C10E9-40A6-408C-AE2C-5FC55E788775" }, { "vulnerable": true, "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.23.0", "versionEndExcluding": "2.23.1", "matchCriteriaId": "C9073ABE-276B-4301-B39C-B9BB6C1AA681" }, { "vulnerable": true, "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.24.0", "versionEndExcluding": "2.24.1", "matchCriteriaId": "B6D58347-1CE3-4AEA-9617-2F46CCBE167E" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493" } ] } ] } ], "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html", "source": "secure@microsoft.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html", "source": "secure@microsoft.com" }, { "url": "https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u", "source": "secure@microsoft.com", "tags": [ "Release Notes", "Third Party Advisory" ] }, { "url": "https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/", "source": "secure@microsoft.com", "tags": [ "Release Notes", "Third Party Advisory" ] }, { "url": "https://security.gentoo.org/glsa/202003-30", "source": "secure@microsoft.com" } ] }