CVE-2019-5436

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/09/11/6 Mailing List Patch Third Party Advisory
https://curl.haxx.se/docs/CVE-2019-5436.html Exploit Patch Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/
https://seclists.org/bugtraq/2020/Feb/36 Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202003-29 Third Party Advisory
https://security.netapp.com/advisory/ntap-20190606-0004/ Third Party Advisory
https://support.f5.com/csp/article/K55133295 Third Party Advisory
https://support.f5.com/csp/article/K55133295?utm_source=f5support&amp%3Butm_medium=RSS
https://www.debian.org/security/2020/dsa-4633 Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2020.html Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html Patch Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/09/11/6 Mailing List Patch Third Party Advisory
https://curl.haxx.se/docs/CVE-2019-5436.html Exploit Patch Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/
https://seclists.org/bugtraq/2020/Feb/36 Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202003-29 Third Party Advisory
https://security.netapp.com/advisory/ntap-20190606-0004/ Third Party Advisory
https://support.f5.com/csp/article/K55133295 Third Party Advisory
https://support.f5.com/csp/article/K55133295?utm_source=f5support&amp%3Butm_medium=RSS
https://www.debian.org/security/2020/dsa-4633 Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2020.html Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:44

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2019/09/11/6 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/09/11/6 - Mailing List, Patch, Third Party Advisory
References () https://curl.haxx.se/docs/CVE-2019-5436.html - Exploit, Patch, Vendor Advisory () https://curl.haxx.se/docs/CVE-2019-5436.html - Exploit, Patch, Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/ -
References () https://seclists.org/bugtraq/2020/Feb/36 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2020/Feb/36 - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202003-29 - Third Party Advisory () https://security.gentoo.org/glsa/202003-29 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20190606-0004/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20190606-0004/ - Third Party Advisory
References () https://support.f5.com/csp/article/K55133295 - Third Party Advisory () https://support.f5.com/csp/article/K55133295 - Third Party Advisory
References () https://support.f5.com/csp/article/K55133295?utm_source=f5support&amp%3Butm_medium=RSS - () https://support.f5.com/csp/article/K55133295?utm_source=f5support&amp%3Butm_medium=RSS -
References () https://www.debian.org/security/2020/dsa-4633 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4633 - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuapr2020.html - Third Party Advisory () https://www.oracle.com/security-alerts/cpuapr2020.html - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuoct2020.html - () https://www.oracle.com/security-alerts/cpuoct2020.html -
References () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - Patch, Third Party Advisory () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - Patch, Third Party Advisory

Information

Published : 2019-05-28 19:29

Updated : 2024-11-21 04:44


NVD link : CVE-2019-5436

Mitre link : CVE-2019-5436

CVE.ORG link : CVE-2019-5436


JSON object : View

Products Affected

fedoraproject

  • fedora

netapp

  • steelstore_cloud_integrated_storage
  • solidfire
  • hci_management_node

opensuse

  • leap

oracle

  • enterprise_manager_ops_center
  • mysql_server
  • oss_support_tools

debian

  • debian_linux

haxx

  • libcurl

f5

  • traffix_signaling_delivery_controller
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write