ID

VAR-201905-0605


CVE

CVE-2019-1853


TITLE

Linux for Cisco AnyConnect Secure Mobility Client Vulnerable to out-of-bounds reading

Trust: 0.8

sources: JVNDB: JVNDB-2019-004587

DESCRIPTION

A vulnerability in the HostScan component of Cisco AnyConnect Secure Mobility Client for Linux could allow an unauthenticated, remote attacker to read sensitive information on an affected system. The vulnerability exists because the affected software performs improper bounds checks. An attacker could exploit this vulnerability by crafting HTTP traffic for the affected component to download and process. A successful exploit could allow the attacker to read sensitive information on the affected system. This issue is being tracked by Cisco Bug ID CSCvn47574. HostScan is one of the network host scanning components. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc

Trust: 2.07

sources: NVD: CVE-2019-1853 // JVNDB: JVNDB-2019-004587 // BID: 108364 // VULHUB: VHN-150885 // VULMON: CVE-2019-1853

AFFECTED PRODUCTS

vendor:ciscomodel:anyconnect secure mobility clientscope:eqversion:4.6\(2074\)

Trust: 1.0

vendor:ciscomodel:anyconnect secure mobility clientscope:eqversion:(linux)

Trust: 0.8

vendor:ciscomodel:anyconnect secure mobility clientscope:eqversion:4.6(2074)

Trust: 0.3

sources: BID: 108364 // JVNDB: JVNDB-2019-004587 // NVD: CVE-2019-1853

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1853
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1853
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1853
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201905-705
value: HIGH

Trust: 0.6

VULHUB: VHN-150885
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-1853
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-1853
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-150885
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-1853
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

ykramarz@cisco.com: CVE-2019-1853
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 2.5
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-150885 // VULMON: CVE-2019-1853 // JVNDB: JVNDB-2019-004587 // CNNVD: CNNVD-201905-705 // NVD: CVE-2019-1853 // NVD: CVE-2019-1853

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.9

sources: VULHUB: VHN-150885 // JVNDB: JVNDB-2019-004587 // NVD: CVE-2019-1853

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-705

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201905-705

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004587

PATCH

title:cisco-sa-20190515-anyconnectclient-oob-readurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-anyconnectclient-oob-read

Trust: 0.8

title:Cisco AnyConnect Secure Mobility Client for Linux Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92829

Trust: 0.6

title:Cisco: Cisco AnyConnect Secure Mobility Client for Linux Out-of-Bounds Memory Read Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20190515-anyconnectclient-oob-read

Trust: 0.1

title:主流供应商的一些攻击性漏洞汇总url:https://github.com/r0eXpeR/supplier

Trust: 0.1

sources: VULMON: CVE-2019-1853 // JVNDB: JVNDB-2019-004587 // CNNVD: CNNVD-201905-705

EXTERNAL IDS

db:NVDid:CVE-2019-1853

Trust: 2.9

db:BIDid:108364

Trust: 2.1

db:JVNDBid:JVNDB-2019-004587

Trust: 0.8

db:CNNVDid:CNNVD-201905-705

Trust: 0.7

db:AUSCERTid:ESB-2019.1760

Trust: 0.6

db:VULHUBid:VHN-150885

Trust: 0.1

db:VULMONid:CVE-2019-1853

Trust: 0.1

sources: VULHUB: VHN-150885 // VULMON: CVE-2019-1853 // BID: 108364 // JVNDB: JVNDB-2019-004587 // CNNVD: CNNVD-201905-705 // NVD: CVE-2019-1853

REFERENCES

url:http://www.securityfocus.com/bid/108364

Trust: 2.4

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-anyconnectclient-oob-read

Trust: 2.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-1853

Trust: 1.4

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1853

Trust: 0.8

url:https://www.auscert.org.au/bulletins/81122

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-anyconnect-secure-mobility-client-information-disclosure-29344

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/r0exper/supplier

Trust: 0.1

sources: VULHUB: VHN-150885 // VULMON: CVE-2019-1853 // BID: 108364 // JVNDB: JVNDB-2019-004587 // CNNVD: CNNVD-201905-705 // NVD: CVE-2019-1853

CREDITS

Robert Scott

Trust: 0.9

sources: BID: 108364 // CNNVD: CNNVD-201905-705

SOURCES

db:VULHUBid:VHN-150885
db:VULMONid:CVE-2019-1853
db:BIDid:108364
db:JVNDBid:JVNDB-2019-004587
db:CNNVDid:CNNVD-201905-705
db:NVDid:CVE-2019-1853

LAST UPDATE DATE

2024-11-23T22:51:49.049000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-150885date:2019-10-09T00:00:00
db:VULMONid:CVE-2019-1853date:2019-10-09T00:00:00
db:BIDid:108364date:2019-05-15T00:00:00
db:JVNDBid:JVNDB-2019-004587date:2019-06-05T00:00:00
db:CNNVDid:CNNVD-201905-705date:2019-05-21T00:00:00
db:NVDid:CVE-2019-1853date:2024-11-21T04:37:32.053

SOURCES RELEASE DATE

db:VULHUBid:VHN-150885date:2019-05-16T00:00:00
db:VULMONid:CVE-2019-1853date:2019-05-16T00:00:00
db:BIDid:108364date:2019-05-15T00:00:00
db:JVNDBid:JVNDB-2019-004587date:2019-06-05T00:00:00
db:CNNVDid:CNNVD-201905-705date:2019-05-15T00:00:00
db:NVDid:CVE-2019-1853date:2019-05-16T02:29:00.607