Lucene search

K
nvd[email protected]NVD:CVE-2019-0657
HistoryMar 05, 2019 - 11:29 p.m.

CVE-2019-0657

2019-03-0523:29:02
CWE-20
web.nvd.nist.gov

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

5.6 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.8%

A vulnerability exists in certain .Net Framework API’s and Visual Studio in the way they parse URL’s, aka ‘.NET Framework and Visual Studio Spoofing Vulnerability’.

Affected configurations

NVD
Node
microsoft.net_coreMatch1.0
OR
microsoft.net_coreMatch2.1
OR
microsoft.net_coreMatch2.2
OR
microsoftpowershell_coreMatch6.0
OR
microsoftpowershell_coreMatch6.1
OR
microsoftvisual_studio_2017Match-
OR
microsoftvisual_studio_2017Match15.9
Node
microsoft.net_frameworkMatch2.0sp2
OR
microsoft.net_frameworkMatch3.0sp2
AND
microsoftwindows_server_2008Match-sp2
Node
microsoft.net_frameworkMatch3.5
AND
microsoftwindows_10Match1607
OR
microsoftwindows_10Match1703
OR
microsoftwindows_10Match1709
OR
microsoftwindows_10Match1803
OR
microsoftwindows_10Match1809
OR
microsoftwindows_8.1Match-
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
OR
microsoftwindows_server_2016Match-
OR
microsoftwindows_server_2016Match1709
OR
microsoftwindows_server_2016Match1803
OR
microsoftwindows_server_2019Match-
Node
microsoft.net_frameworkMatch3.5.1
AND
microsoftwindows_7Match-sp1
OR
microsoftwindows_server_2008Matchr2sp1itanium
OR
microsoftwindows_server_2008Matchr2sp1x64
Node
microsoft.net_frameworkMatch4.5.2
AND
microsoftwindows_7Match-sp1
OR
microsoftwindows_8.1Match-
OR
microsoftwindows_rt_8.1Match-
OR
microsoftwindows_server_2008Match-sp1x64
OR
microsoftwindows_server_2008Match-sp2
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
Node
microsoft.net_frameworkMatch4.6
AND
microsoftwindows_server_2008Match-sp2
Node
microsoft.net_frameworkMatch4.6.2
OR
microsoft.net_frameworkMatch4.7
OR
microsoft.net_frameworkMatch4.7.1
OR
microsoft.net_frameworkMatch4.7.2
AND
microsoftwindows_10Match1607
OR
microsoftwindows_server_2016Match-
Node
microsoft.net_frameworkMatch4.6
OR
microsoft.net_frameworkMatch4.6.1
OR
microsoft.net_frameworkMatch4.6.2
AND
microsoftwindows_10Match-
Node
microsoft.net_frameworkMatch4.6
OR
microsoft.net_frameworkMatch4.6.1
OR
microsoft.net_frameworkMatch4.6.2
OR
microsoft.net_frameworkMatch4.7
OR
microsoft.net_frameworkMatch4.7.1
OR
microsoft.net_frameworkMatch4.7.2
AND
microsoftwindows_7Match-sp1
OR
microsoftwindows_8.1Match-
OR
microsoftwindows_rt_8.1Match-
OR
microsoftwindows_server_2008Match-sp1x64
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
Node
microsoft.net_frameworkMatch4.7.1
OR
microsoft.net_frameworkMatch4.7.2
AND
microsoftwindows_10Match1709
OR
microsoftwindows_server_2016Match1709
Node
microsoft.net_frameworkMatch4.7.2
AND
microsoftwindows_10Match1803
OR
microsoftwindows_10Match1809
OR
microsoftwindows_server_2016Match1803
OR
microsoftwindows_server_2019Match-
Node
microsoft.net_frameworkMatch4.7
OR
microsoft.net_frameworkMatch4.7.1
OR
microsoft.net_frameworkMatch4.7.2
AND
microsoftwindows_10Match1703

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

5.6 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.8%