Vulnerability Details : CVE-2019-14459
Potential exploit
nfdump 1.6.17 and earlier is affected by an integer overflow in the function Process_ipfix_template_withdraw in ipfix.c that can be abused in order to crash the process remotely (denial of service).
Vulnerability category: OverflowDenial of service
Products affected by CVE-2019-14459
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
- cpe:2.3:a:nfdump_project:nfdump:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-14459
0.40%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-14459
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2019-14459
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-14459
-
https://github.com/phaag/nfdump/issues/171
Integer overflow in Process_ipfix_template_withdraw (ipfix.c) · Issue #171 · phaag/nfdump · GitHubExploit;Third Party Advisory
-
https://security.gentoo.org/glsa/202003-17
nfdump: Multiple vulnerabilities (GLSA 202003-17) — Gentoo securityThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/09/msg00021.html
[SECURITY] [DLA 2383-1] nfdump security updateMailing List;Third Party Advisory
-
https://github.com/phaag/nfdump/commit/3b006ededaf351f1723aea6c727c9edd1b1fff9b
Fix potential unsigned integer underflow · phaag/nfdump@3b006ed · GitHubPatch
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULSZMKA7P7REJMANVL7D6WMZ2L7IRSET/
[SECURITY] Fedora 30 Update: nfdump-1.6.18-1.fc30 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTONOGJU5FSMFNRCT6OHXYUMDRKH4RPA/
[SECURITY] Fedora 29 Update: nfdump-1.6.18-1.fc29 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
Jump to