René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

127 lines
3.5 KiB
JSON

{
"id": "CVE-2019-7309",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-02-03T02:29:00.237",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled."
},
{
"lang": "es",
"value": "En GNU C Library (tambi\u00e9n conocido como glibc o libc6), hasta la versi\u00f3n 2.29, la funci\u00f3n memcmp para la arquitectura x32 puede devolver cero (indicando que las entradas son iguales) de manera incorrecta debido a que el bit de RDX m\u00e1s significativo se gestiona incorrectamente."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*",
"versionEndIncluding": "2.29",
"matchCriteriaId": "90936868-EB88-41E3-A01D-D5F469CE46C3"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/106835",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://security.gentoo.org/glsa/202006-04",
"source": "cve@mitre.org"
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24155",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}