Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-16159

Опубликовано: 09 сент. 2019
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:nic:bird:*:*:*:*:*:*:*:*
Версия от 1.6.0 (включая) до 1.6.7 (включая)
cpe:2.3:a:nic:bird:*:*:*:*:*:*:*:*
Версия от 2.0.0 (включая) до 2.0.5 (включая)
Конфигурация 2
cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
Конфигурация 4
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

EPSS

Процентиль: 90%
0.05295
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.

CVSS3: 7.5
debian
больше 6 лет назад

BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 ...

suse-cvrf
больше 6 лет назад

Security update for bird

CVSS3: 7.5
github
больше 3 лет назад

BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.

CVSS3: 7.5
fstec
больше 6 лет назад

Уязвимость реализации протокола маршрутизации пакетов в Unix-подобных операционных системах bird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 90%
0.05295
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-787