← Zuruck zu CVEs
CVE-2019-11068
CRITICAL9.8
Beschreibung
libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht4/10/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoranetapp:active_iq_unified_managernetapp:cloud_backupnetapp:e-series_santricity_management_plug-insnetapp:e-series_santricity_os_controllernetapp:e-series_santricity_storage_managernetapp:e-series_santricity_unified_managernetapp:e-series_santricity_web_services_proxynetapp:element_softwarenetapp:hci_management_nodenetapp:oncommand_insightnetapp:oncommand_workflow_automationnetapp:plug-in_for_symantec_netbackupnetapp:santricity_unified_managernetapp:snapmanagernetapp:solidfirenetapp:steelstore_cloud_integrated_storageopensuse:leaporacle:jdkxmlsoft:libxslt
Referenzen
http://www.openwall.com/lists/oss-security/2019/04/22/1(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2019/04/23/5(cve@mitre.org)
https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20191017-0001/(cve@mitre.org)
https://usn.ubuntu.com/3947-1/(cve@mitre.org)
https://usn.ubuntu.com/3947-2/(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00048.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00052.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00053.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/04/22/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/04/23/5(af854a3a-2127-422b-91ae-364da2661108)
https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/04/msg00016.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191017-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3947-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3947-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.