Vulnerability Details : CVE-2019-20391
Potential exploit
An invalid memory access flaw is present in libyang before v1.0-r3 in the function resolve_feature_value() when an if-feature statement is used inside a bit. Applications that use libyang to parse untrusted input yang files may crash.
Vulnerability category: Overflow
Products affected by CVE-2019-20391
- cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:1.0:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:1.0:r2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-20391
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-20391
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2019-20391
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-20391
-
https://bugzilla.redhat.com/show_bug.cgi?id=1793934
1793934 – libyang: invalid memory access in resolve_feature_value() when a if-feature is used inside a bitIssue Tracking;Patch;Third Party Advisory
-
https://github.com/CESNET/libyang/compare/v1.0-r2...v1.0-r3
Comparing v1.0-r2...v1.0-r3 · CESNET/libyang · GitHubThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html
[SECURITY] [DLA 3572-1] libyang security update
-
https://github.com/CESNET/libyang/commit/bdb596ddc07596fa212f231135b87d0b9178f6f8
resolve BUGFIX handle yet unresolved if-features · CESNET/libyang@bdb596d · GitHubPatch;Third Party Advisory
-
https://github.com/CESNET/libyang/issues/772
Segmentation fault in yangfuzz and yanglint · Issue #772 · CESNET/libyang · GitHubExploit;Third Party Advisory
Jump to