Vulnerability Details : CVE-2019-19204
Potential exploit
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.
Products affected by CVE-2019-19204
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
- cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*
- cpe:2.3:a:oniguruma_project:oniguruma:6.9.4:rc1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-19204
11.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-19204
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2019-19204
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-19204
-
https://github.com/ManhNDd/CVE-2019-19204
GitHub - ManhNDd/CVE-2019-19204: Heap-buffer-overflow in Oniguruma (function fetch_interval_quantifier)Exploit;Third Party Advisory
-
https://github.com/tarantula-team/CVE-2019-19204
GitHub - tarantula-team/CVE-2019-19204: Heap-buffer-overflow in Oniguruma (function fetch_interval_quantifier)Third Party Advisory
-
https://usn.ubuntu.com/4460-1/
USN-4460-1: Oniguruma vulnerabilities | Ubuntu security notices | Ubuntu
-
https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
Release 6.9.4 Release Candidate 2 · kkos/oniguruma · GitHubRelease Notes
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
[SECURITY] Fedora 31 Update: oniguruma-6.9.4-1.fc31 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
[SECURITY] [DLA 2020-1] libonig security updateThird Party Advisory
-
https://github.com/kkos/oniguruma/issues/162
heap-buffer-overflow in fetch_interval_quantifier due to double PFETCH · Issue #162 · kkos/oniguruma · GitHubExploit;Patch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
[SECURITY] Fedora 30 Update: oniguruma-6.9.2-4.fc30 - package-announce - Fedora Mailing-ListsThird Party Advisory
Jump to