Vulnerability Details : CVE-2019-5719
In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the ISAKMP dissector could crash. This was addressed in epan/dissectors/packet-isakmp.c by properly handling the case of a missing decryption data block.
Exploit prediction scoring system (EPSS) score for CVE-2019-5719
Probability of exploitation activity in the next 30 days: 0.19%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 56 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2019-5719
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
[email protected] |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
[email protected] |
CWE ids for CVE-2019-5719
-
The product uses a broken or risky cryptographic algorithm or protocol.Assigned by: [email protected] (Primary)
References for CVE-2019-5719
-
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b5b02f2a9b8772d8814096f86c60a32889d61f2c
Patch;Vendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
-
https://www.debian.org/security/2019/dsa-4416
Third Party Advisory
-
https://seclists.org/bugtraq/2019/Mar/35
Mailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2019/01/msg00022.html
Third Party Advisory
-
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15374
Exploit;Issue Tracking;Vendor Advisory
-
https://www.wireshark.org/security/wnpa-sec-2019-04.html
Vendor Advisory
Products affected by CVE-2019-5719
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*