ID

VAR-201904-0321


CVE

CVE-2019-3930


TITLE

Crestron AM-100 Buffer error vulnerability in products such as firmware

Trust: 0.8

sources: JVNDB: JVNDB-2019-004039

DESCRIPTION

The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to a stack buffer overflow in libAwgCgi.so's PARSERtoCHAR function. A remote, unauthenticated attacker can use this vulnerability to execute arbitrary code as root via a crafted request to the return.cgi endpoint. Crestron AM-100 Firmware and other products have a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. A buffer error vulnerability exists in the 'PARSERtoCHAR' function of the libAwgCgi.so file in several routers. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc

Trust: 1.8

sources: NVD: CVE-2019-3930 // JVNDB: JVNDB-2019-004039 // VULHUB: VHN-155365 // VULMON: CVE-2019-3930

AFFECTED PRODUCTS

vendor:barcomodel:wepresent wipg-1000pscope:eqversion:2.3.0.10

Trust: 1.8

vendor:barcomodel:wepresent wipg-1600wscope:ltversion:2.4.1.19

Trust: 1.8

vendor:extronmodel:sharelink 200scope:eqversion:2.0.3.4

Trust: 1.8

vendor:extronmodel:sharelink 250scope:eqversion:2.0.3.4

Trust: 1.8

vendor:infocusmodel:liteshow3scope:eqversion:1.0.16

Trust: 1.8

vendor:infocusmodel:liteshow4scope:eqversion:2.0.0.7

Trust: 1.8

vendor:optomamodel:wps-proscope:eqversion:1.0.0.5

Trust: 1.8

vendor:sharpmodel:pn-l703wascope:eqversion:1.4.2.3

Trust: 1.8

vendor:crestronmodel:am-101scope:eqversion:2.7.0.2

Trust: 1.0

vendor:teqavitmodel:wips710scope:eqversion:1.1.0.7

Trust: 1.0

vendor:crestronmodel:am-100scope:eqversion:1.6.0.2

Trust: 1.0

vendor:blackboxmodel:hd wireless presentation systemscope:eqversion:1.0.0.5

Trust: 1.0

vendor:black box network servicesmodel:hd wireless presentation systemscope:eqversion:1.0.0.5

Trust: 0.8

vendor:crestronmodel:airmedia am-100scope:eqversion:1.6.0.2

Trust: 0.8

vendor:crestronmodel:airmedia am-101scope:eqversion:2.7.0.1

Trust: 0.8

vendor:teq avitmodel:wips710scope:eqversion:1.1.0.7

Trust: 0.8

sources: JVNDB: JVNDB-2019-004039 // NVD: CVE-2019-3930

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-3930
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-3930
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201904-1388
value: CRITICAL

Trust: 0.6

VULHUB: VHN-155365
value: HIGH

Trust: 0.1

VULMON: CVE-2019-3930
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-3930
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-155365
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-3930
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-3930
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-155365 // VULMON: CVE-2019-3930 // JVNDB: JVNDB-2019-004039 // CNNVD: CNNVD-201904-1388 // NVD: CVE-2019-3930

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-121

Trust: 1.0

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-155365 // JVNDB: JVNDB-2019-004039 // NVD: CVE-2019-3930

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201904-1388

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201904-1388

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004039

PATCH

title:wePresent WiPG-1000url:https://www.barco.com/en/product/wepresent-wipg-1000

Trust: 0.8

title:wePresent WiPG-1600Wurl:https://www.barco.com/en/product/wepresent-wipg-1600w

Trust: 0.8

title:Top Pageurl:https://www.blackbox.com/en-us

Trust: 0.8

title:AM-100url:https://www.crestron.com/en-US/Products/Workspace-Solutions/Wireless-Presentation-Solutions/AirMedia-Presentation-Gateways/AM-100

Trust: 0.8

title:AM-101url:https://www.crestron.com/en-US/Products/Workspace-Solutions/Wireless-Presentation-Solutions/AirMedia-Presentation-Gateways/AM-101

Trust: 0.8

title:Top Pageurl:https://www.extron.com/

Trust: 0.8

title:Top Pageurl:https://www.infocus.com/

Trust: 0.8

title:WPS Prourl:https://www.optoma.com/us/product/wps-pro/

Trust: 0.8

title:Top Pageurl:https://www.teq-avit.com/

Trust: 0.8

title:PN-L703WAurl:https://jp.sharp/business/bigpad/lineup/pnl703wa/

Trust: 0.8

title:Threatposturl:https://threatpost.com/bugs-wireless-presentation-systems/144318/

Trust: 0.1

sources: VULMON: CVE-2019-3930 // JVNDB: JVNDB-2019-004039

EXTERNAL IDS

db:NVDid:CVE-2019-3930

Trust: 2.6

db:TENABLEid:TRA-2019-20

Trust: 2.6

db:JVNDBid:JVNDB-2019-004039

Trust: 0.8

db:CNNVDid:CNNVD-201904-1388

Trust: 0.7

db:VULHUBid:VHN-155365

Trust: 0.1

db:VULMONid:CVE-2019-3930

Trust: 0.1

sources: VULHUB: VHN-155365 // VULMON: CVE-2019-3930 // JVNDB: JVNDB-2019-004039 // CNNVD: CNNVD-201904-1388 // NVD: CVE-2019-3930

REFERENCES

url:https://www.tenable.com/security/research/tra-2019-20

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-3930

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3930

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/bugs-wireless-presentation-systems/144318/

Trust: 0.1

sources: VULHUB: VHN-155365 // VULMON: CVE-2019-3930 // JVNDB: JVNDB-2019-004039 // CNNVD: CNNVD-201904-1388 // NVD: CVE-2019-3930

SOURCES

db:VULHUBid:VHN-155365
db:VULMONid:CVE-2019-3930
db:JVNDBid:JVNDB-2019-004039
db:CNNVDid:CNNVD-201904-1388
db:NVDid:CVE-2019-3930

LAST UPDATE DATE

2024-11-23T21:37:29.184000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-155365date:2020-10-16T00:00:00
db:VULMONid:CVE-2019-3930date:2020-10-16T00:00:00
db:JVNDBid:JVNDB-2019-004039date:2019-05-27T00:00:00
db:CNNVDid:CNNVD-201904-1388date:2020-10-19T00:00:00
db:NVDid:CVE-2019-3930date:2024-11-21T04:42:53.220

SOURCES RELEASE DATE

db:VULHUBid:VHN-155365date:2019-04-30T00:00:00
db:VULMONid:CVE-2019-3930date:2019-04-30T00:00:00
db:JVNDBid:JVNDB-2019-004039date:2019-05-27T00:00:00
db:CNNVDid:CNNVD-201904-1388date:2019-04-30T00:00:00
db:NVDid:CVE-2019-3930date:2019-04-30T21:29:00.777