Vulnerability Details : CVE-2019-20454
Potential exploit
An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.
Products affected by CVE-2019-20454
- cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
- cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
- cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
- cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-20454
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-20454
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
5.1
|
MEDIUM | CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
1.4
|
3.6
|
MITRE | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2019-20454
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-20454
-
https://security.gentoo.org/glsa/202006-16
PCRE2: Denial of service (GLSA 202006-16) — Gentoo securityThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQRAHYHLRNMBTPR3KXVM27NSZP3KTOPI/
[SECURITY] Fedora 31 Update: mingw-pcre2-10.33-3.fc31 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://vcs.pcre.org/pcre2?view=revision&revision=1092
[pcre2] Revision 1092Broken Link;Patch
-
https://bugs.php.net/bug.php?id=78338
PHP :: Sec Bug #78338 :: Array cross-border reading/global variable coverage in PCREExploit;Issue Tracking;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1735494
1735494 – (CVE-2019-20454) CVE-2019-20454 pcre: out-of-bounds read in JIT mode when \X is used in non-UTF modeIssue Tracking;Patch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQRAHYHLRNMBTPR3KXVM27NSZP3KTOPI/
[SECURITY] Fedora 31 Update: mingw-pcre2-10.33-3.fc31 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/03/msg00014.html
[SECURITY] [DLA 3363-1] pcre2 security updateMailing List;Third Party Advisory
-
https://bugs.exim.org/show_bug.cgi?id=2421
Bug 2421 – Array cross-border reading/global variable coverage in PCRE LibraryIssue Tracking;Permissions Required;Third Party Advisory
Jump to