9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
Recent assessments:
busterb at June 15, 2020 6:59pm UTC reported:
A buffer overread in a very specific part of the glibc regex engine is something, but nothing really by itself. A read might potentially give an attacker a memory leak, but given the number of vendors who havenβt patched I donβt really believe the βnetworkβ vector or the high criticality granted from the NVD CVSS. Red Hatβs assessment is more in line: <https://access.redhat.com/security/cve/cve-2019-9169>
To fully address this vuln, literally every Linux installation on the planet would have to be patched, which just isnβt going to happen.
Assessed Attacker Value: 1
Assessed Attacker Value: 1Assessed Attacker Value: 1
www.securityfocus.com/bid/107160
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
kc.mcafee.com/corporate/index?page=content&id=SB10278
security.gentoo.org/glsa/202006-04
security.netapp.com/advisory/ntap-20190315-0002
sourceware.org/bugzilla/show_bug.cgi?id=24114
sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
support.f5.com/csp/article/K54823184
usn.ubuntu.com/4416-1
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P