← Voltar para CVEs
CVE-2019-20503
MEDIUM6.5
Descricao
usrsctp before 2019-12-20 has out-of-bounds reads in sctp_load_addresses_from_init.
Detalhes CVE
Pontuacao CVSS v3.16.5
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioREQUIRED
Publicado3/6/2020
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxusrsctp_project:usrsctp
Fraquezas (CWE)
CWE-125
Referencias
http://seclists.org/fulldisclosure/2020/May/49(cve@mitre.org)
http://seclists.org/fulldisclosure/2020/May/52(cve@mitre.org)
http://seclists.org/fulldisclosure/2020/May/55(cve@mitre.org)
http://seclists.org/fulldisclosure/2020/May/59(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0815(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0816(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0819(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2020:0820(cve@mitre.org)
https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html(cve@mitre.org)
https://crbug.com/1059349(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DDNOAGIX5D77TTHT6YPMVJ5WTXTCQEI/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWANFIR3PYAL5RJQ4AO3ZS2DYMSF2ZGZ/(cve@mitre.org)
https://security.gentoo.org/glsa/202003-02(cve@mitre.org)
https://security.gentoo.org/glsa/202003-10(cve@mitre.org)
https://support.apple.com/HT211168(cve@mitre.org)
https://support.apple.com/HT211171(cve@mitre.org)
https://support.apple.com/HT211175(cve@mitre.org)
https://support.apple.com/HT211177(cve@mitre.org)
https://support.apple.com/kb/HT211168(cve@mitre.org)
https://support.apple.com/kb/HT211171(cve@mitre.org)
https://support.apple.com/kb/HT211175(cve@mitre.org)
https://support.apple.com/kb/HT211177(cve@mitre.org)
https://usn.ubuntu.com/4299-1/(cve@mitre.org)
https://usn.ubuntu.com/4328-1/(cve@mitre.org)
https://usn.ubuntu.com/4335-1/(cve@mitre.org)
https://www.debian.org/security/2020/dsa-4639(cve@mitre.org)
https://www.debian.org/security/2020/dsa-4642(cve@mitre.org)
https://www.debian.org/security/2020/dsa-4645(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2020/May/49(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2020/May/52(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2020/May/55(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2020/May/59(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0815(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0816(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0819(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0820(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.chromium.org/p/project-zero/issues/detail?id=1992(af854a3a-2127-422b-91ae-364da2661108)
https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html(af854a3a-2127-422b-91ae-364da2661108)
https://crbug.com/1059349(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/sctplab/usrsctp/commit/790a7a2555aefb392a5a69923f1e9d17b4968467(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/03/msg00013.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/03/msg00023.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/07/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DDNOAGIX5D77TTHT6YPMVJ5WTXTCQEI/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWANFIR3PYAL5RJQ4AO3ZS2DYMSF2ZGZ/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202003-02(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202003-10(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT211168(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT211171(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT211175(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT211177(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT211168(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT211171(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT211175(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT211177(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4299-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4328-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4335-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2020/dsa-4639(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2020/dsa-4642(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2020/dsa-4645(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.