René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

124 lines
3.7 KiB
JSON

{
"id": "CVE-2019-11940",
"sourceIdentifier": "cve-assign@fb.com",
"published": "2019-12-04T17:16:43.773",
"lastModified": "2019-12-17T20:18:50.240",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In the course of decompressing HPACK inside the HTTP2 protocol, an unexpected sequence of header table resize operations can place the header table into a corrupted state, leading to a use-after-free condition and undefined behavior. This issue affects Proxygen from v0.29.0 until v2017.04.03.00."
},
{
"lang": "es",
"value": "En el curso de una descompresi\u00f3n HPACK dentro del protocolo HTTP2, una secuencia no prevista de operaciones de cambio de tama\u00f1o de la tabla de encabezado puede colocar la tabla de encabezado en un estado corrupto, lo que conlleva a una condici\u00f3n de uso de la memoria previamente liberada y un comportamiento no definido. Este problema afecta a Proxygen desde la versi\u00f3n v0.29.0 hasta v2017.04.03.00."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "cve-assign@fb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.29.0",
"versionEndIncluding": "2017.04.03.00",
"matchCriteriaId": "79F3A695-DEBF-4C2B-B8EB-1BFB2874FDD5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/facebook/proxygen/commit/f43b134cc5c19d8532e7fb670a1c02e85f7a8d4f",
"source": "cve-assign@fb.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://www.facebook.com/security/advisories/cve-2019-11940",
"source": "cve-assign@fb.com",
"tags": [
"Third Party Advisory"
]
}
]
}