Vulnerability Details : CVE-2019-20392
Potential exploit
An invalid memory access flaw is present in libyang before v1.0-r1 in the function resolve_feature_value() when an if-feature statement is used inside a list key node, and the feature used is not defined. Applications that use libyang to parse untrusted input yang files may crash.
Vulnerability category: Overflow
Products affected by CVE-2019-20392
- cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*
- cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-20392
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 36 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-20392
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2019-20392
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-20392
-
https://github.com/CESNET/libyang/commit/32fb4993bc8bb49e93e84016af3c10ea53964be5
schema tree BUGFIX do not check features while still resolving schema · CESNET/libyang@32fb499 · GitHubPatch;Third Party Advisory
-
https://github.com/CESNET/libyang/compare/v0.16-r3...v1.0-r1
Comparing v0.16-r3...v1.0-r1 · CESNET/libyang · GitHubThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html
[SECURITY] [DLA 3572-1] libyang security update
-
https://bugzilla.redhat.com/show_bug.cgi?id=1793922
1793922 – libyang: invalid memory access when if-feature statement is used inside a list key nodeIssue Tracking;Patch;Third Party Advisory
-
https://github.com/CESNET/libyang/issues/723
Segmentation fault when if-feature is used in list key node, with a non existing feature · Issue #723 · CESNET/libyang · GitHubExploit;Third Party Advisory
Jump to