CVE-2019-13118

CVSS V2 Medium 5 CVSS V3 High 7.5
Description
In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.
Overview
  • CVE ID
  • CVE-2019-13118
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2019-07-01T02:15:09
  • Last Modified Date
  • 2023-04-10T15:52:12
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:xmlsoft:libxslt:1.1.33:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • NONE
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
https://oss-fuzz.com/testcase-detail/5197371471822848 Permissions Required
https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b Patch Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15069 Permissions Required
https://support.apple.com/kb/HT210346
https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html
https://support.apple.com/kb/HT210353
https://support.apple.com/kb/HT210348
https://support.apple.com/kb/HT210351
https://seclists.org/bugtraq/2019/Jul/37
https://seclists.org/bugtraq/2019/Jul/36
https://seclists.org/bugtraq/2019/Jul/35
http://seclists.org/fulldisclosure/2019/Jul/24
http://seclists.org/fulldisclosure/2019/Jul/22
http://seclists.org/fulldisclosure/2019/Jul/26
https://support.apple.com/kb/HT210356
http://seclists.org/fulldisclosure/2019/Jul/23
https://support.apple.com/kb/HT210357
https://support.apple.com/kb/HT210358
https://seclists.org/bugtraq/2019/Jul/41
https://seclists.org/bugtraq/2019/Jul/42
https://seclists.org/bugtraq/2019/Jul/40
http://seclists.org/fulldisclosure/2019/Jul/31
http://seclists.org/fulldisclosure/2019/Jul/38
http://seclists.org/fulldisclosure/2019/Jul/37
https://security.netapp.com/advisory/ntap-20190806-0004/
https://seclists.org/bugtraq/2019/Aug/25
https://seclists.org/bugtraq/2019/Aug/23
https://seclists.org/bugtraq/2019/Aug/21
https://seclists.org/bugtraq/2019/Aug/22
http://seclists.org/fulldisclosure/2019/Aug/14
http://seclists.org/fulldisclosure/2019/Aug/13
http://seclists.org/fulldisclosure/2019/Aug/11
http://seclists.org/fulldisclosure/2019/Aug/15
https://usn.ubuntu.com/4164-1/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/
http://www.openwall.com/lists/oss-security/2019/11/17/2
https://www.oracle.com/security-alerts/cpujan2020.html
https://security.netapp.com/advisory/ntap-20200122-0003/
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
History
Created Old Value New Value Data Type Notes
2022-05-10 07:09:28 Added to TrackCVE
2022-12-03 22:40:07 2019-07-01T02:15Z 2019-07-01T02:15:09 CVE Published Date updated
2022-12-03 22:40:07 2021-06-29T15:15:14 CVE Modified Date updated
2022-12-03 22:40:07 Modified Vulnerability Status updated
2023-04-10 15:07:17 Modified Undergoing Analysis Vulnerability Status updated
2023-04-11 08:11:24 2023-04-10T15:52:12 CVE Modified Date updated
2023-04-11 08:11:24 Undergoing Analysis Analyzed Vulnerability Status updated