ID

VAR-201905-0991


CVE

CVE-2019-0820


TITLE

.NET Framework and .NET Core Vulnerable to denial of service operation

Trust: 0.8

sources: JVNDB: JVNDB-2019-003848

DESCRIPTION

A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981. This vulnerability CVE-2019-0980 and CVE-2019-0981 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. An attacker can exploit this issue to cause a denial of service condition. Bug Fix(es): * dotnet: new SocketException((int)SocketError.InvalidArgument).Message is empty (BZ#1712471) 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: .NET Core on Red Hat Enterprise Linux security and bug fix update Advisory ID: RHSA-2019:1236-01 Product: .NET Core on Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1236 Issue date: 2019-05-15 CVE Names: CVE-2019-0820 CVE-2019-0980 CVE-2019-0981 ==================================================================== 1. Summary: Updates for rh-dotnetcore10-dotnetcore, rh-dotnetcore11-dotnetcore, rh-dotnet21-dotnet, rh-dotnet22-dotnet and rh-dotnet22-curl are now available for .NET Core on Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core 1.0.16, 1.1.13, 2.1.11, and 2.2.5. Security Fix(es): * dotNET: timeouts for regular expressions are not enforced (CVE-2019-0820) * dotNET: infinite loop in URI.TryCreate leading to ASP.Net Core Denial of Service (CVE-2019-0980) * dotNET: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service (CVE-2019-0981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Re-enable bash completion in rh-dotnet22-dotnet (BZ#1654863) * Error rebuilding rh-dotnet22-curl in CentOS (BZ#1678932) * Broken apphost caused by unset DOTNET_ROOT (BZ#1703479) * Make bash completion compatible with rh-dotnet22 packages (BZ#1705259) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1654863 - Re-enable bash completion in rh-dotnet22-dotnet 1678932 - Error rebuilding rh-dotnet22-curl in CentOS 1703479 - Broken apphost caused by unset DOTNET_ROOT 1703508 - Update to .NET Core 1.1.13 1704454 - Update to .NET Core 1.0.16 1704934 - Update to .NET Core Runtime 2.2.5 and SDK 2.2.107 1705147 - Update to .NET Core Runtime 2.1.11 and SDK 2.1.507 1705259 - Make bash completion compatible with rh-dotnet22 packages 1705502 - CVE-2019-0980 dotNET: infinite loop in URI.TryCreate leading to ASP.Net Core Denial of Service 1705504 - CVE-2019-0981 dotNET: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service 1705506 - CVE-2019-0820 dotNET: timeouts for regular expressions are not enforced 6. Package List: .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7): Source: rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm x86_64: rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7): Source: rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm x86_64: rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7): Source: rh-dotnet21-2.1-10.el7.src.rpm rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm x86_64: rh-dotnet21-2.1-10.el7.x86_64.rpm rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7): Source: rh-dotnet22-2.2-7.el7.src.rpm rh-dotnet22-curl-7.61.1-2.el7.src.rpm rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm x86_64: rh-dotnet22-2.2-7.el7.x86_64.rpm rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Server (v. 7): Source: rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm x86_64: rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Server (v. 7): Source: rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm x86_64: rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Server (v. 7): Source: rh-dotnet21-2.1-10.el7.src.rpm rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm x86_64: rh-dotnet21-2.1-10.el7.x86_64.rpm rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Server (v. 7): Source: rh-dotnet22-2.2-7.el7.src.rpm rh-dotnet22-curl-7.61.1-2.el7.src.rpm rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm x86_64: rh-dotnet22-2.2-7.el7.x86_64.rpm rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Workstation (v. 7): Source: rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm x86_64: rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Workstation (v. 7): Source: rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm x86_64: rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Workstation (v. 7): Source: rh-dotnet21-2.1-10.el7.src.rpm rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm x86_64: rh-dotnet21-2.1-10.el7.x86_64.rpm rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Workstation (v. 7): Source: rh-dotnet22-2.2-7.el7.src.rpm rh-dotnet22-curl-7.61.1-2.el7.src.rpm rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm x86_64: rh-dotnet22-2.2-7.el7.x86_64.rpm rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-0820 https://access.redhat.com/security/cve/CVE-2019-0980 https://access.redhat.com/security/cve/CVE-2019-0981 https://access.redhat.com/security/updates/classification/#moderate https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0820 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0980 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0981 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXNyKvtzjgjWX9erEAQiFIQ//RuDdkjwFrjsW69TloyogPym1x5uZp2eB hMR1l6l3YTE5ZIeCz7nn86P7IYtLAOiYj5ynjNbGT7aHrM7/R4REedYYqCFxWuu3 3N6vgg/ap1fB+0XdNX+PFNWm/orYRiVr6jyZs2hX4LSDLsQwHuOqVoDcApAHnggH kCRpaxlTEaG9/wyIY3Zvd7ZasxfVUfzhlpzpw25kq6OFJyIokWnVE8G+vs5KS3GQ pTir+3hMc3as8RQVCnWNZoeUhSUemZHvq5MyQqwLCeMFf6CvUTe04oDrMp7FUJHa UcImbcSzzrx3kBvFFmIv6D1uCetuRTrMaXBuOlZcpCJUcnHncvb1OvFhqAeGO6uN NqNnDyRUbyX2cHKpyYTUIfZsCsgKIOBHZNU911URlqnvHAu0LlgAOM0r1uXU48Wg z+LtgnFTDbRmFEspKpN98z4whSL8BnMR8VS/FmPfXo2ApFvipofCK+kPStU0lXZB n7xn4PJyKfst8xUkRfwJ09/GpN328i7QtH53aQG0HCQzKRhxswnc86aQnPW95RWP DPd4EAB74Bq1pEYqRN/gai6bhFsoCS0agf+M7lqBN8ZnQOScj5HD5hy8fsPvB1xD /I5I1sIOJ+Ar0FaCfZqFoXKncap0cp/bBJlHvfCpze4yISy7h6t2E/4l59Zs1xhm KCZo5tPFVoU=dJ6F -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.16

sources: NVD: CVE-2019-0820 // JVNDB: JVNDB-2019-003848 // BID: 108245 // VULMON: CVE-2019-0820 // PACKETSTORM: 152999 // PACKETSTORM: 152953

AFFECTED PRODUCTS

vendor:microsoftmodel:.net frameworkscope:eqversion:4.7.2

Trust: 2.1

vendor:microsoftmodel:.net frameworkscope:eqversion:4.7.1

Trust: 2.1

vendor:microsoftmodel:.net frameworkscope:eqversion:4.6.2

Trust: 2.1

vendor:microsoftmodel:.net frameworkscope:eqversion:4.6.1

Trust: 2.1

vendor:microsoftmodel:.net frameworkscope:eqversion:3.5.1

Trust: 2.1

vendor:microsoftmodel:.net frameworkscope:eqversion:4.8

Trust: 2.1

vendor:microsoftmodel:.net frameworkscope:eqversion:4.7

Trust: 2.1

vendor:microsoftmodel:.net frameworkscope:eqversion:4.6

Trust: 2.1

vendor:microsoftmodel:.net frameworkscope:eqversion:4.5.2

Trust: 2.1

vendor:microsoftmodel:.net frameworkscope:eqversion:3.5

Trust: 2.1

vendor:microsoftmodel:.net corescope:eqversion:2.2

Trust: 2.1

vendor:microsoftmodel:.net corescope:eqversion:2.1

Trust: 2.1

vendor:microsoftmodel:.net corescope:eqversion:1.1

Trust: 2.1

vendor:microsoftmodel:.net corescope:eqversion:1.0

Trust: 2.1

vendor:microsoftmodel:.net frameworkscope:eqversion:3.0

Trust: 1.3

vendor:microsoftmodel:.net frameworkscope:eqversion:2.0

Trust: 1.3

vendor:redhatmodel:enterprise linuxscope:eqversion:8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:8.6

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.6

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:8.6

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:8.4

Trust: 1.0

vendor:microsoftmodel:.net frameworkscope:eqversion:2.0 sp2

Trust: 0.8

vendor:microsoftmodel:.net frameworkscope:eqversion:3.0 sp2

Trust: 0.8

vendor:microsoftmodel:powershell corescope:eqversion:6.1

Trust: 0.8

vendor:microsoftmodel:powershell corescope:eqversion:6.2

Trust: 0.8

sources: BID: 108245 // JVNDB: JVNDB-2019-003848 // NVD: CVE-2019-0820

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-0820
value: HIGH

Trust: 1.0

NVD: CVE-2019-0820
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201905-419
value: HIGH

Trust: 0.6

VULMON: CVE-2019-0820
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-0820
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2019-0820
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-0820
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2019-0820 // JVNDB: JVNDB-2019-003848 // CNNVD: CNNVD-201905-419 // NVD: CVE-2019-0820

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.0

problemtype:CWE-20

Trust: 0.8

sources: JVNDB: JVNDB-2019-003848 // NVD: CVE-2019-0820

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-419

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201905-419

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-003848

PATCH

title:CVE-2019-0820 | .NET Framework and .NET Core Denial of Service Vulnerabilityurl:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0820

Trust: 0.8

title:CVE-2019-0820 | .NET Framework と .NET Core のサービス拒否の脆弱性url:https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2019-0820

Trust: 0.8

title:Microsoft .NET Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92588

Trust: 0.6

title:Red Hat: Moderate: .NET Core on Red Hat Enterprise Linux security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191236 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dotnet security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191259 - Security Advisory

Trust: 0.1

title:snowflake-connector-neturl:https://github.com/snowflakedb/snowflake-connector-net

Trust: 0.1

title: - url:https://github.com/TortugaResearch/Tortuga.Data.Snowflake

Trust: 0.1

title:Symantec Threat Intelligence Blogurl:https://www.symantec.com/blogs/threat-intelligence/microsoft-patch-tuesday-may-2019

Trust: 0.1

sources: VULMON: CVE-2019-0820 // JVNDB: JVNDB-2019-003848 // CNNVD: CNNVD-201905-419

EXTERNAL IDS

db:NVDid:CVE-2019-0820

Trust: 3.0

db:BIDid:108245

Trust: 1.0

db:JVNDBid:JVNDB-2019-003848

Trust: 0.8

db:PACKETSTORMid:152999

Trust: 0.7

db:PACKETSTORMid:152953

Trust: 0.7

db:AUSCERTid:ESB-2019.1839

Trust: 0.6

db:AUSCERTid:ESB-2019.1740

Trust: 0.6

db:CNNVDid:CNNVD-201905-419

Trust: 0.6

db:VULMONid:CVE-2019-0820

Trust: 0.1

sources: VULMON: CVE-2019-0820 // BID: 108245 // JVNDB: JVNDB-2019-003848 // PACKETSTORM: 152999 // PACKETSTORM: 152953 // CNNVD: CNNVD-201905-419 // NVD: CVE-2019-0820

REFERENCES

url:https://access.redhat.com/errata/rhsa-2019:1259

Trust: 2.4

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0820

Trust: 2.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-0820

Trust: 1.6

url:http://www.microsoft.com

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0820

Trust: 0.8

url:https://www.ipa.go.jp/security/ciadr/vul/20190515-ms.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2019/at190023.html

Trust: 0.8

url:https://www.securityfocus.com/bid/108245

Trust: 0.7

url:https://access.redhat.com/errata/rhsa-2019:1236

Trust: 0.7

url:https://packetstormsecurity.com/files/152999/red-hat-security-advisory-2019-1259-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/81042

Trust: 0.6

url:https://packetstormsecurity.com/files/152953/red-hat-security-advisory-2019-1236-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1839/

Trust: 0.6

url:https://vigilance.fr/vulnerability/microsoft-net-vulnerabilities-of-may-2019-29296

Trust: 0.6

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0980

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-0981

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-0980

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-0981

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-0980

Trust: 0.2

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0981

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-0820

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/400.html

Trust: 0.1

url:https://github.com/snowflakedb/snowflake-connector-net

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/108245

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-0757

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-0757

Trust: 0.1

url:https://github.com/dotnet/core/blob/master/release-notes/2.1/2.1.11/2.1.11.md

Trust: 0.1

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0757

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

sources: VULMON: CVE-2019-0820 // BID: 108245 // JVNDB: JVNDB-2019-003848 // PACKETSTORM: 152999 // PACKETSTORM: 152953 // CNNVD: CNNVD-201905-419 // NVD: CVE-2019-0820

CREDITS

Red Hat,Microsoft

Trust: 0.6

sources: CNNVD: CNNVD-201905-419

SOURCES

db:VULMONid:CVE-2019-0820
db:BIDid:108245
db:JVNDBid:JVNDB-2019-003848
db:PACKETSTORMid:152999
db:PACKETSTORMid:152953
db:CNNVDid:CNNVD-201905-419
db:NVDid:CVE-2019-0820

LAST UPDATE DATE

2024-08-14T13:26:22.140000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2019-0820date:2023-02-02T00:00:00
db:BIDid:108245date:2019-05-14T00:00:00
db:JVNDBid:JVNDB-2019-003848date:2019-05-23T00:00:00
db:CNNVDid:CNNVD-201905-419date:2021-08-16T00:00:00
db:NVDid:CVE-2019-0820date:2023-02-02T19:16:40.193

SOURCES RELEASE DATE

db:VULMONid:CVE-2019-0820date:2019-05-16T00:00:00
db:BIDid:108245date:2019-05-14T00:00:00
db:JVNDBid:JVNDB-2019-003848date:2019-05-23T00:00:00
db:PACKETSTORMid:152999date:2019-05-22T14:39:27
db:PACKETSTORMid:152953date:2019-05-16T23:05:23
db:CNNVDid:CNNVD-201905-419date:2019-05-14T00:00:00
db:NVDid:CVE-2019-0820date:2019-05-16T19:29:00.880