ID

VAR-201811-0538


CVE

CVE-2018-19519


TITLE

tcpdump Vulnerable to out-of-bounds reading

Trust: 0.8

sources: JVNDB: JVNDB-2018-012466

DESCRIPTION

In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization. tcpdump Contains an out-of-bounds vulnerability.Information may be obtained. TcpDump can completely intercept the data packets transmitted in the network for analysis. It supports filtering for the network layer, protocol, host, network or port, and provides logical statements such as and, or, not to help you remove useless information. The vulnerability stems from a lack of initialization. Tcpdump is prone to a buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code in the context of an affected system. Failed exploit attempts may result in a denial-of-service condition; this can result in the attacker gaining complete control of the affected system. Tcpdump version 4.9.2 is vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Low: tcpdump security update Advisory ID: RHSA-2019:3976-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:3976 Issue date: 2019-11-26 CVE Names: CVE-2018-19519 ==================================================================== 1. Summary: An update for tcpdump is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: The tcpdump packages contain the tcpdump utility for monitoring network traffic. The tcpdump utility can capture and display the packet headers on a particular network interface or on all interfaces. Security Fix(es): * tcpdump: Stack-based buffer over-read in print-hncp.c:print_prefix() via crafted pcap (CVE-2018-19519) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux Client (v. 7): Source: tcpdump-4.9.2-4.el7_7.1.src.rpm x86_64: tcpdump-4.9.2-4.el7_7.1.x86_64.rpm tcpdump-debuginfo-4.9.2-4.el7_7.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: tcpdump-4.9.2-4.el7_7.1.src.rpm x86_64: tcpdump-4.9.2-4.el7_7.1.x86_64.rpm tcpdump-debuginfo-4.9.2-4.el7_7.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: tcpdump-4.9.2-4.el7_7.1.src.rpm ppc64: tcpdump-4.9.2-4.el7_7.1.ppc64.rpm tcpdump-debuginfo-4.9.2-4.el7_7.1.ppc64.rpm ppc64le: tcpdump-4.9.2-4.el7_7.1.ppc64le.rpm tcpdump-debuginfo-4.9.2-4.el7_7.1.ppc64le.rpm s390x: tcpdump-4.9.2-4.el7_7.1.s390x.rpm tcpdump-debuginfo-4.9.2-4.el7_7.1.s390x.rpm x86_64: tcpdump-4.9.2-4.el7_7.1.x86_64.rpm tcpdump-debuginfo-4.9.2-4.el7_7.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: tcpdump-4.9.2-4.el7_7.1.src.rpm x86_64: tcpdump-4.9.2-4.el7_7.1.x86_64.rpm tcpdump-debuginfo-4.9.2-4.el7_7.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-19519 https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXd0v59zjgjWX9erEAQiWURAAoSK275KjDThA2PXizWpBo5ooIKEnzrhB Vv1sjiBO6P3HQkMh3lB8/DRrYzzV9inK64X5d0C1xkJa4rhhc0NyVAfuaQ2y5NsT +JkUFMCpNC+veWj5+gGB2Ajamgm8DUYzvBh6DXjAX5s2hOqAYkvcikXCu6wACIF/ fv0w0UKpFowELfU6YMSFxxRT1jpRNCubyQPfhTfKz8RofghGabFqSBhzO4frWclT dA5FzPt+a+XL39fwCK3xzCl89O6F1sQJ1q7BoEmCUTPlM2sdr239w14uhJmT4tJL WHEUiLxwkV5pqMwEQy5cyGgX9g9kCQivEABqXqPQkKsYxaLOkzyVmzt51iTG8/b4 l87AyG6JksynDbm5sQVMn1x0RSOGibmGacAqsQImEK/wT/jRU8nzzGNJ6WrM0mwE x08Ra4UFmZJBZnSXZYu6cyxEHDK5I4ZUBbVGoAwXoN+Jm07jeswueo0HcHVvrWAy aj1RXCsyG6vZ+ds8lPQiiNPS0cxQvhmA71WKwA+EmOTpVJYAD8zud2wwC4df6inq 6US0CBocB68XhIZ7l70BZA/cWBI1fYZw84YFFBUo13Q0OiO5E/K6U3RaYrxXZQtI DYLWi968XjgaRlOAmY5KguDJCdg05P0c90kEpwriLnc3e+ArxHNfAcAbRkolmiWW GP1oftliVec=TVn3 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 8) - aarch64, ppc64le, s390x, x86_64 3. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section. ========================================================================= Ubuntu Security Notice USN-4252-2 January 27, 2020 tcpdump vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM - Ubuntu 12.04 ESM Summary: Several security issues were fixed in tcpdump. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: Multiple security issues were discovered in tcpdump. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: tcpdump 4.9.3-0ubuntu0.14.04.1+esm1 Ubuntu 12.04 ESM: tcpdump 4.9.3-0ubuntu0.12.04.1 This update uses a new upstream release, which includes additional bug fixes. Security Fix(es): * golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283) * SSL/TLS: CBC padding timing attack (lucky-13) (CVE-2013-0169) * grafana: XSS vulnerability via a column style on the "Dashboard > Table Panel" screen (CVE-2018-18624) * js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection (CVE-2019-11358) * npm-serialize-javascript: XSS via unsafe characters in serialized regular expressions (CVE-2019-16769) * kibana: Prototype pollution in TSVB could result in arbitrary code execution (ESA-2020-06) (CVE-2020-7013) * nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598) * npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser (CVE-2020-7662) * nodejs-lodash: prototype pollution in zipObjectDeep function (CVE-2020-8203) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * jQuery: passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) * grafana: stored XSS (CVE-2020-11110) * grafana: XSS annotation popup vulnerability (CVE-2020-12052) * grafana: XSS via column.title or cellLinkTooltip (CVE-2020-12245) * nodejs-elliptic: improper encoding checks allows a certain degree of signature malleability in ECDSA signatures (CVE-2020-13822) * golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) * openshift/console: text injection on error page via crafted url (CVE-2020-10715) * kibana: X-Frame-Option not set by default might lead to clickjacking (CVE-2020-10743) * openshift: restricted SCC allows pods to craft custom network packets (CVE-2020-14336) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Solution: For OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster - -cli.html. Bugs fixed (https://bugzilla.redhat.com/): 907589 - CVE-2013-0169 SSL/TLS: CBC padding timing attack (lucky-13) 1701972 - CVE-2019-11358 jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection 1767665 - CVE-2020-10715 openshift/console: text injection on error page via crafted url 1804533 - CVE-2020-9283 golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic 1813344 - CVE-2020-7598 nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload 1828406 - CVE-2020-11022 jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method 1834550 - CVE-2020-10743 kibana: X-Frame-Option not set by default might lead to clickjacking 1845982 - CVE-2020-7662 npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser 1848089 - CVE-2020-12052 grafana: XSS annotation popup vulnerability 1848092 - CVE-2019-16769 npm-serialize-javascript: XSS via unsafe characters in serialized regular expressions 1848643 - CVE-2020-12245 grafana: XSS via column.title or cellLinkTooltip 1848647 - CVE-2020-13822 nodejs-elliptic: improper encoding checks allows a certain degree of signature malleability in ECDSA signatures 1849044 - CVE-2020-7013 kibana: Prototype pollution in TSVB could result in arbitrary code execution (ESA-2020-06) 1850004 - CVE-2020-11023 jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution 1850572 - CVE-2018-18624 grafana: XSS vulnerability via a column style on the "Dashboard > Table Panel" screen 1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash 1857412 - CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function 1857977 - CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function 1858981 - CVE-2020-14336 openshift: restricted SCC allows pods to craft custom network packets 1861044 - CVE-2020-11110 grafana: stored XSS 1874671 - CVE-2020-14336 ose-machine-config-operator-container: openshift: restricted SCC allows pods to craft custom network packets [openshift-4] 5. Description: OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. Additional Changes: This update also fixes several bugs and adds various enhancements. This advisory contains the following OpenShift Virtualization 2.4.0 images: RHEL-7-CNV-2.4 ============== kubevirt-ssp-operator-container-v2.4.0-71 RHEL-8-CNV-2.4 ============== virt-cdi-controller-container-v2.4.0-29 virt-cdi-uploadproxy-container-v2.4.0-29 hostpath-provisioner-container-v2.4.0-25 virt-cdi-operator-container-v2.4.0-29 kubevirt-metrics-collector-container-v2.4.0-18 cnv-containernetworking-plugins-container-v2.4.0-36 kubevirt-kvm-info-nfd-plugin-container-v2.4.0-18 hostpath-provisioner-operator-container-v2.4.0-31 virt-cdi-uploadserver-container-v2.4.0-29 virt-cdi-apiserver-container-v2.4.0-29 virt-controller-container-v2.4.0-58 virt-cdi-cloner-container-v2.4.0-29 kubevirt-template-validator-container-v2.4.0-21 vm-import-operator-container-v2.4.0-21 kubernetes-nmstate-handler-container-v2.4.0-37 node-maintenance-operator-container-v2.4.0-27 virt-operator-container-v2.4.0-58 kubevirt-v2v-conversion-container-v2.4.0-23 cnv-must-gather-container-v2.4.0-73 virtio-win-container-v2.4.0-15 kubevirt-cpu-node-labeller-container-v2.4.0-19 ovs-cni-plugin-container-v2.4.0-37 kubevirt-vmware-container-v2.4.0-21 hyperconverged-cluster-operator-container-v2.4.0-70 virt-handler-container-v2.4.0-58 virt-cdi-importer-container-v2.4.0-29 virt-launcher-container-v2.4.0-58 kubevirt-cpu-model-nfd-plugin-container-v2.4.0-17 virt-api-container-v2.4.0-58 ovs-cni-marker-container-v2.4.0-38 kubemacpool-container-v2.4.0-39 cluster-network-addons-operator-container-v2.4.0-38 bridge-marker-container-v2.4.0-39 vm-import-controller-container-v2.4.0-21 hco-bundle-registry-container-v2.3.0-497 3. Bugs fixed (https://bugzilla.redhat.com/): 1684772 - virt-launcher images do not have the edk2-ovmf package installed 1716329 - missing Status, Version and Label for a number of CNV components, and Status term inconsistency 1724978 - [RFE][v2v] Improve the way we display progress percent in UI 1725672 - CDI: getting error with "unknown reason" when trying to create UploadTokenRequest for a none existing pvc 1727117 - [RFE] Reduce installed libvirt components 1780473 - Delete VM is hanging if the corresponding template does not exist anymore 1787213 - KubeMacpool may not work from time to time since it is skipped when we face certificate issue. 1789564 - Failed to allocate a SRIOV VF to VMI 1795889 - internal IP shown on VMI spec instead of public one on VMI with guest-agent 1796342 - VM Failing to start since hard disk not ready 1802554 - [SSP] cpu-feature-lahf_lm and Conroe are enabled on one worker (test issue) 1805044 - No mem/filesystem/Network Utilization in VM overview 1806288 - [CDI] fails to import images that comes from url that reject HEAD requests 1806436 - [SSP] Windows common templates - Windows10 should be removed from windows-server* templates, windows-server* should not have desktop version 1811111 - All the VM templates are visible in the developer catalog but not really/easily instantiable 1811417 - Failed to install cnv-2.4 on top of ocp 4.4 (hco operator in crashLoopBackOff state) 1816518 - [SSP] Common templates - template name under objects -> metadata -> labels should be identical to the template actual name 1817080 - node maintenance CRD is marked with NonStructuralSchema condition 1819252 - kubevirt-ssp-operator cannot create ServiceMonitor object 1820651 - CDI import fails using block volume (available size -1) 1821209 - Debug log message looks unprofessional 1822079 - nmstate-handler fails to start and keeps restarting 1822315 - status.desiredState: doesn't pick the correct value and is null 1823342 - Invalid qcow2 image causes HTTP range error and difficult to read stack trace 1823699 - [CNV-2.4] Failing to deploy NetworkAddons 1823701 - [CNV-2.4] when a single component is failing, HCO can continue reporting outdated negative conditions also on other components 1825801 - [CNV-2.4] Failing to deploy due issues in CRD of cluster network operator 1826044 - [CNV-2.4] Failing to deploy due issues in CRD of cluster host-path-provisioner operator 1827257 - VMs' connectivity is available even the two VMs are in different vlan 1828401 - misconfigured prow job e2e-aws-4.5-cnv resulting in step e2e-aws failed: step needs a lease but no lease client provided 1829376 - VMs with blank block volumes fail to spin up 1830780 - virt-v2v-wrapper - 0% VM migration progress in UI 1831536 - kubevirt-{handler,apiserver,controller} service accounts added to the privileged SCC 1832179 - [virt] VM with runStrategy attribute (instead of 'running' attribute) does not have 'RUNNING' state in cli 1832283 - [SSP operator] Common templates and template_validator are missing after clean installation 1832291 - SSP installation is successful even with some components missing 1832769 - [kubevirt version] is not reported correctly 1833220 - CVE-2020-10749 containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters 1833376 - Hardcoded VMware-vix-disklib version 6 - import fail with version 7 1833786 - kubevirt hyperconverged-cluster-operator deploy_marketplace.sh fails in disconnected cluster 1834253 - VMs are stuck in Starting state 1835242 - Can't query SSP CRs after upgrade from 2.3 to 2.4 1835426 - [RFE] Provide a clear error message when VM and VMI name does not match 1836792 - [CNV deployment] kubevirt components are missing 1837182 - VMI virt-launcher reaches Error state after running for 10-24 hours 1837670 - Specifying "Ubuntu 18.04 LTS" force the Conroe CPU model 1838066 - [CNV deployment] kubevirt failing to create cpu-plugin-configmap obsoleteCPUs 1838424 - [Installation] CNV 2.4.0 virt-handler and kubevirt-node-labeller pods are not showing up 1839982 - [CNV][DOC] Lack of explanation for StorageClass default accessMode in openshift-cnv kubevirt-storage-class-defaults 1840047 - [CNV-2.4] virt-handler failing on /usr/bin/container-disk: no such file or directory 1840220 - [CNV-2.4] node-maintenance-operator failing to create deployment - invalid format of manifest 1840652 - Upgrade indication is missing 1841065 - [v2v] RHV to CNV: VM import fail on network mapping validation 1841325 - [CNV][V2V] VM migration fails if VMWare host isn't under Cluster but directly under Datacenter 1841505 - [CNV-2.4] virt-template-validator container fails to start 1842869 - vmi cannot be scheduled, because node labeller doesn't report correct labels 1842958 - [SSP] Fail to create Windows VMs from templates - windows-cd-bus validation added but cdrom is missing from the template 1843219 - node-labeller SCC is privileged, which appears too relaxed 1843456 - virt-launcher goes from running to error state due to panic: timed out waiting for domain to be defined 1843467 - [CNV network KMP] kubemacpool causes worker node to be Ready,SchedulingDisabled 1843519 - HCO CR is not listed when running "kubectl get all" from command line 1843948 - [Network operator] Upgrade from 2.3 to 2.4 - Network operator fails to upgrade ovs-cni pods, upgrade is not completed 1844057 - [CNV-2.4] cluster-network-addons-operator failing to start 1844105 - [SSP operator] Upgrade from 2.3.0 to 2.4.0- SSP operator fails to upgrade node labeller and template validator 1844907 - kubemacpool deployment status errors regarding replicas 1845060 - Node-labeller is in pending state when node doesn't have kvm device 1845061 - Version displayed in Container Native Virtualization OperatorHub side panel 1845477 - [SSP] Template validator fails to "Extract the CA bundle"; template validator is not called when a VM is created 1845557 - [CNV-2.4] template validator webhook fails with certification issues 1845604 - [v2v] RHV to CNV VM import: Prevent a second vm-import from starting. 1845899 - [CNV-2.5] cluster-network-addons-operator failing to start 1845901 - Filesystem corruption related to smart clone 1847070 - vmi cannot be scheduled , qemu-kvm core dump 1847594 - pods in openshift-cnv namespace no longer have openshift.io/scc under metadata.annotations 1848004 - [CNV-2.5] Deployment fails on NetworkAddonsConfigNotAvailable 1848007 - [CNV-2.4] Deployment fails on NetworkAddonsConfigNotAvailable 1848951 - CVE-2020-14316 kubevirt: VMIs can be used to access host files 1849527 - [v2v] [api] VM import RHV to CNV importer should stop send requests to RHV if they are rejected because of wrong user/pass 1849915 - [v2v] VM import RHV to CNV: The timezone data is not available in the vm-import-controller image. 1850425 - [v2v][VM import RHV to CNV] Add validation for network target type in network mapping 1850467 - [v2v] [api] VM import RHV to CNV invalid target network type should not crash the controller 1850482 - [v2v][VM import from RHV to CNV] 2 nics are mapped to a new network though second was mapped to pod. 1850937 - kubemacpool fails in a specific order of components startup 1851856 - Deployment not progressing due to PriorityClass missing 1851886 - [CNV][V2V] VMWare pod is failing when running wizard to migrate from RHV 1852446 - [v2v][RHV to CNV VM import] Windows10 VM import fail on: timezone is not UTC-compatible 1853028 - CNV must-gather failure on CNV-QE BM-RHCOS environment 1853133 - [CNV-2.4] Deployment fails on KubeVirtMetricsAggregationNotAvailable 1853373 - virtctl image-upload fails to upload an image if the dv name includes a "." 1854419 - [Re-brand] Align CSV 1854744 - To stabilize some tests I need to backport PRs which change production code 1855256 - [v2v][RHV to CNV VM import] Empty directories created for vm-import-operator/controller logs in cnv-must-gather 1856438 - [CNAO] Upgrade is not completed (wrong operatorVersion), CR is not updated. 1856447 - CNV upgrade - HCO fails to identify wrong observedVersion in CR, HCO is reported as READY 1856979 - Domain notify errors break VMI migrations and graceful shutdown 5

Trust: 3.06

sources: NVD: CVE-2018-19519 // JVNDB: JVNDB-2018-012466 // CNVD: CNVD-2019-41451 // BID: 106098 // VULMON: CVE-2018-19519 // PACKETSTORM: 155468 // PACKETSTORM: 156096 // PACKETSTORM: 157466 // PACKETSTORM: 156097 // PACKETSTORM: 159727 // PACKETSTORM: 158637

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-41451

AFFECTED PRODUCTS

vendor:tcpdumpmodel:tcpdumpscope:eqversion:4.9.2

Trust: 2.6

vendor:the tcpdump groupmodel:tcpdumpscope:eqversion:4.9.2

Trust: 0.8

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

sources: CNVD: CNVD-2019-41451 // VULMON: CVE-2018-19519 // BID: 106098 // JVNDB: JVNDB-2018-012466 // CNNVD: CNNVD-201811-665 // NVD: CVE-2018-19519

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-19519
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-19519
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2019-41451
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201811-665
value: MEDIUM

Trust: 0.6

VULMON: CVE-2018-19519
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-19519
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-41451
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2018-19519
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-41451 // VULMON: CVE-2018-19519 // JVNDB: JVNDB-2018-012466 // CNNVD: CNNVD-201811-665 // NVD: CVE-2018-19519

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.8

problemtype:CWE-909

Trust: 1.0

sources: JVNDB: JVNDB-2018-012466 // NVD: CVE-2018-19519

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201811-665

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201811-665

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-012466

PATCH

title:Top Pageurl:https://www.tcpdump.org/

Trust: 0.8

title:Red Hat: Low: tcpdump security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20193976 - Security Advisory

Trust: 0.1

title:Red Hat: Low: tcpdump security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20201604 - Security Advisory

Trust: 0.1

title:Red Hat: CVE-2018-19519url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2018-19519

Trust: 0.1

title:IBM: IBM Security Bulletin: Vulnerability in tcpdump affects AIX (CVE-2018-19519) Security Bulletinurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=59fd3d8b6912a340a48ce5972041189c

Trust: 0.1

title:Amazon Linux 2: ALAS2-2020-1385url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2020-1385

Trust: 0.1

title:Ubuntu Security Notice: tcpdump vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4252-2

Trust: 0.1

title:Ubuntu Security Notice: tcpdump vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4252-1

Trust: 0.1

sources: VULMON: CVE-2018-19519 // JVNDB: JVNDB-2018-012466

EXTERNAL IDS

db:NVDid:CVE-2018-19519

Trust: 4.0

db:BIDid:106098

Trust: 2.0

db:PULSESECUREid:SA44516

Trust: 1.6

db:JVNDBid:JVNDB-2018-012466

Trust: 0.8

db:PACKETSTORMid:155468

Trust: 0.7

db:PACKETSTORMid:157466

Trust: 0.7

db:PACKETSTORMid:156097

Trust: 0.7

db:PACKETSTORMid:159727

Trust: 0.7

db:PACKETSTORMid:158637

Trust: 0.7

db:CNVDid:CNVD-2019-41451

Trust: 0.6

db:AUSCERTid:ESB-2020.2593

Trust: 0.6

db:AUSCERTid:ESB-2019.4489

Trust: 0.6

db:AUSCERTid:ESB-2020.1538

Trust: 0.6

db:AUSCERTid:ESB-2020.0289

Trust: 0.6

db:AUSCERTid:ESB-2020.3700

Trust: 0.6

db:AUSCERTid:ESB-2019.0593

Trust: 0.6

db:CNNVDid:CNNVD-201811-665

Trust: 0.6

db:VULMONid:CVE-2018-19519

Trust: 0.1

db:PACKETSTORMid:156096

Trust: 0.1

sources: CNVD: CNVD-2019-41451 // VULMON: CVE-2018-19519 // BID: 106098 // JVNDB: JVNDB-2018-012466 // PACKETSTORM: 155468 // PACKETSTORM: 156096 // PACKETSTORM: 157466 // PACKETSTORM: 156097 // PACKETSTORM: 159727 // PACKETSTORM: 158637 // CNNVD: CNNVD-201811-665 // NVD: CVE-2018-19519

REFERENCES

url:http://www.securityfocus.com/bid/106098

Trust: 3.0

url:https://github.com/zyingp/temp/blob/master/tcpdump.md

Trust: 2.8

url:https://access.redhat.com/errata/rhsa-2019:3976

Trust: 2.4

url:https://usn.ubuntu.com/4252-2/

Trust: 2.3

url:https://usn.ubuntu.com/4252-1/

Trust: 2.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-19519

Trust: 2.0

url:https://kb.pulsesecure.net/articles/pulse_security_advisories/sa44516

Trust: 1.6

url:https://access.redhat.com/security/cve/cve-2018-19519

Trust: 1.3

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62xy42u6hy3h2apr5ehnwcz7saqnmmjn/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/fnyxf3iy2x65iod422sa6equulsgw7fn/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/r2udposgvjqiyc33sqbxmdxhh4qdsdmu/

Trust: 1.0

url:http://www.tcpdump.org/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19519

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62xy42u6hy3h2apr5ehnwcz7saqnmmjn/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/fnyxf3iy2x65iod422sa6equulsgw7fn/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/r2udposgvjqiyc33sqbxmdxhh4qdsdmu/

Trust: 0.7

url:http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc

Trust: 0.6

url:http://www.ibm.com/support/docview.wss

Trust: 0.6

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10873086

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3700/

Trust: 0.6

url:https://packetstormsecurity.com/files/155468/red-hat-security-advisory-2019-3976-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1538/

Trust: 0.6

url:https://packetstormsecurity.com/files/158637/red-hat-security-advisory-2020-3194-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/157466/red-hat-security-advisory-2020-1604-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76122

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4489/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2593/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0289/

Trust: 0.6

url:https://packetstormsecurity.com/files/156097/ubuntu-security-notice-usn-4252-2.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-is-affected-by-a-tcpdump-vulnerability-cve-2018-19519/

Trust: 0.6

url:https://packetstormsecurity.com/files/159727/red-hat-security-advisory-2020-4298-01.html

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-16808

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14882

Trust: 0.2

url:https://usn.ubuntu.com/4252-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14462

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14466

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-16230

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14470

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-20852

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-19126

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-12448

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-1549

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-9251

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17451

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-20060

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-1547

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-5482

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-20060

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-13752

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-11324

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-19925

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-1010204

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-11324

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-11236

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-5481

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-12447

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-12049

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-5436

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-13753

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-12447

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-5094

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-3844

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-20852

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-1010180

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-3825

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-18074

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-20337

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-19923

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-14822

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14404

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-12449

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8457

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-15847

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-11236

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-19924

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-14404

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-1010204

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-1563

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-16056

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-20337

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-18074

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-19959

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-13232

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-3843

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-1010180

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-12449

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-9251

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-12448

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-11008

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=59195

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/tcpdump/4.9.3-0ubuntu0.16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/tcpdump/4.9.3-0ubuntu0.18.04.1

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:1604

Trust: 0.1

url:https://usn.ubuntu.com/4252-2

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8768

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8535

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10743

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-15718

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20657

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1712

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8518

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8611

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8203

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-6251

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8676

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11070

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-7150

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-7664

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8607

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12052

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14973

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8623

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15366

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8594

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8690

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8601

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3822

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3823

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-7146

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7013

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8524

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-10739

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-18751

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16890

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8536

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8686

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8671

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8544

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8571

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15719

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2013-0169

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8677

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-18624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8595

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8558

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11459

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11358

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8679

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-12795

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20657

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-6454

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-12450

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20483

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14336

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8619

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4298

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8622

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7598

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8681

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8523

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0169

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-6237

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-6706

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20483

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8673

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8559

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8687

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13822

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/updating/updating-cluster

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-16769

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8672

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11023

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11358

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8608

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7662

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8615

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-7665

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8666

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5953

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8689

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14498

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8735

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8586

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12245

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8726

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8596

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8696

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8610

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18408

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13636

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16890

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11070

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14498

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-7149

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12450

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-10739

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11110

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8584

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8675

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8563

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10531

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14040

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10715

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8609

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9283

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8587

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-18751

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8506

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-18624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11022

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8583

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11459

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8597

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11080

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17451

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14563

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10754

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13777

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10749

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11501

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-7263

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8616

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-1549

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14563

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-1563

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-16056

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3194

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12888

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13752

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13753

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12662

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12663

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-7263

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14822

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10757

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10766

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13232

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10768

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14316

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12653

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18934

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10767

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-1547

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8617

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15847

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3016

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12654

Trust: 0.1

sources: CNVD: CNVD-2019-41451 // VULMON: CVE-2018-19519 // BID: 106098 // JVNDB: JVNDB-2018-012466 // PACKETSTORM: 155468 // PACKETSTORM: 156096 // PACKETSTORM: 157466 // PACKETSTORM: 156097 // PACKETSTORM: 159727 // PACKETSTORM: 158637 // CNNVD: CNNVD-201811-665 // NVD: CVE-2018-19519

CREDITS

Sam Fowler,Ubuntu,Red Hat

Trust: 0.6

sources: CNNVD: CNNVD-201811-665

SOURCES

db:CNVDid:CNVD-2019-41451
db:VULMONid:CVE-2018-19519
db:BIDid:106098
db:JVNDBid:JVNDB-2018-012466
db:PACKETSTORMid:155468
db:PACKETSTORMid:156096
db:PACKETSTORMid:157466
db:PACKETSTORMid:156097
db:PACKETSTORMid:159727
db:PACKETSTORMid:158637
db:CNNVDid:CNNVD-201811-665
db:NVDid:CVE-2018-19519

LAST UPDATE DATE

2024-08-14T13:10:00.972000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-41451date:2019-11-20T00:00:00
db:VULMONid:CVE-2018-19519date:2020-08-24T00:00:00
db:BIDid:106098date:2018-12-03T00:00:00
db:JVNDBid:JVNDB-2018-012466date:2019-02-04T00:00:00
db:CNNVDid:CNNVD-201811-665date:2020-10-29T00:00:00
db:NVDid:CVE-2018-19519date:2023-11-07T02:55:34.093

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-41451date:2019-11-20T00:00:00
db:VULMONid:CVE-2018-19519date:2018-11-25T00:00:00
db:BIDid:106098date:2018-12-03T00:00:00
db:JVNDBid:JVNDB-2018-012466date:2019-02-04T00:00:00
db:PACKETSTORMid:155468date:2019-11-26T17:22:11
db:PACKETSTORMid:156096date:2020-01-27T22:54:52
db:PACKETSTORMid:157466date:2020-04-28T20:39:49
db:PACKETSTORMid:156097date:2020-01-27T22:55:02
db:PACKETSTORMid:159727date:2020-10-27T16:59:02
db:PACKETSTORMid:158637date:2020-07-29T00:06:36
db:CNNVDid:CNNVD-201811-665date:2018-11-26T00:00:00
db:NVDid:CVE-2018-19519date:2018-11-25T20:29:00.273