5.3

CVE-2019-13118

In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
XmlsoftLibxslt Version1.1.33
OpensuseLeap Version15.1
NetappActive Iq Unified Manager Version- SwPlatformvmware_vsphere
NetappActive Iq Unified Manager Version- SwPlatformwindows
NetappCloud Backup Version-
NetappE-series Santricity Management Plug-ins Version- SwPlatformvmware_vcenter
NetappE-series Santricity Os Controller Version >= 11.0 <= 11.50.2
NetappE-series Santricity Web Services Version- SwPlatformweb_services_proxy
NetappOncommand Insight Version-
OracleJdk Version1.8.0 Updateupdate231
FedoraprojectFedora Version31
CanonicalUbuntu Linux Version12.04 SwEdition-
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionesm
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.04
CanonicalUbuntu Linux Version19.10
AppleiCloud SwPlatformwindows Version < 7.13
AppleiCloud SwPlatformwindows Version >= 10.0 < 10.6
AppleiTunes SwPlatformwindows Version < 12.9.6
AppleiPhone OS Version < 12.4
ApplemacOS X Version10.12.6 Updatesecurity_update_2019-001
ApplemacOS X Version10.12.6 Updatesecurity_update_2019-002
ApplemacOS X Version10.12.6 Updatesecurity_update_2019-003
ApplemacOS X Version10.13.6 Updatesecurity_update_2019-001
ApplemacOS X Version10.13.6 Updatesecurity_update_2019-002
ApplemacOS X Version10.13.6 Updatesecurity_update_2019-003
ApplemacOS Version >= 10.4.6 < 10.14.6
AppletvOS Version < 12.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.21% 0.784
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')

The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.

http://seclists.org/fulldisclosure/2019/Aug/11
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2019/Jul/22
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Aug/21
Third Party Advisory
Mailing List
https://usn.ubuntu.com/4164-1/
Third Party Advisory
http://seclists.org/fulldisclosure/2019/Aug/13
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2019/Aug/14
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2019/Aug/15
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2019/Jul/23
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2019/Jul/24
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2019/Jul/26
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2019/Jul/31
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2019/Jul/37
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2019/Jul/38
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Aug/22
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Aug/23
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Aug/25
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Jul/35
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Jul/36
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Jul/37
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Jul/40
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Jul/41
Third Party Advisory
Mailing List
https://seclists.org/bugtraq/2019/Jul/42
Third Party Advisory
Mailing List