Vulnerability Name:

CVE-2019-0210 (CCN-169459)

Assigned:2018-11-14
Published:2019-10-17
Updated:2022-10-29
Summary:In Apache Thrift 0.9.3 to 0.12.0, a server implemented in Go using TJSONProtocol or TSimpleJSONProtocol may panic when feed with invalid input data.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-125
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2019-0210

Source: CONFIRM
Type: Mailing List, Vendor Advisory
http://mail-archives.apache.org/mod_mbox/thrift-dev/201910.mbox/%3C277A46CA87494176B1BBCF5D72624A2A%40HAGGIS%3E

Source: CCN
Type: Apache Web site
Thrift

Source: REDHAT
Type: Third Party Advisory
RHSA-2020:0804

Source: REDHAT
Type: Third Party Advisory
RHSA-2020:0805

Source: REDHAT
Type: Third Party Advisory
RHSA-2020:0806

Source: REDHAT
Type: Third Party Advisory
RHSA-2020:0811

Source: XF
Type: UNKNOWN
apache-thrift-cve20190210-dos(169459)

Source: MLIST
Type: Mailing List, Vendor Advisory
[pulsar-commits] 20210122 [GitHub] [pulsar] hpvd commented on issue #9248: Upgrade Thrift dependency in broker to solve CVE-2019-0210 and CVE-2019-0205

Source: MLIST
Type: Mailing List, Vendor Advisory
[pulsar-commits] 20210607 [GitHub] [pulsar] lhotari commented on issue #9248: Upgrade Thrift dependency in broker to solve CVE-2019-0210, CVE-2019-0205 and CVE-2020-13949

Source: MLIST
Type: Mailing List, Vendor Advisory
[pulsar-commits] 20210120 [GitHub] [pulsar] fmiguelez opened a new issue #9248: Upgrade Thrift dependency in broker to solve CVE-2019-0210 and CVE-2019-0205

Source: MLIST
Type: Mailing List, Vendor Advisory
[pulsar-commits] 20210121 [GitHub] [pulsar] hpvd commented on issue #9248: Upgrade Thrift dependency in broker to solve CVE-2019-0210 and CVE-2019-0205

Source: CCN
Type: oss-sec Mailing List, Thu, 17 Oct 2019 00:46:17 +0200
CVE-2019-0210: Apache Thrift: out-of-bounds read vulnerability

Source: GENTOO
Type: Third Party Advisory
GLSA-202107-32

Source: CCN
Type: IBM Security Bulletin 1120701 (Watson Machine Learning CE)
Multiple vulenerabilities CVE-2019-0205, CVE-2019-0210 in thrift package

Source: CCN
Type: IBM Security Bulletin 6252853 (Cognos Analytics)
IBM Cognos Analytics has addressed multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6572497 (Security Guardium)
IBM Security Guardium is affected by multiple vulnerabilities in Apache Thrift

Source: CCN
Type: IBM Security Bulletin 6983567 (Watson Discovery)
IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Apache Thrift

Source: N/A
Type: Patch, Third Party Advisory
N/A

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2019-0210

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:thrift:*:*:*:*:*:*:*:* (Version >= 0.9.3 and <= 0.12.0)

  • Configuration 2:
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:oracle:communications_cloud_native_core_network_slice_selection_function:1.2.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:thrift:0.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:thrift:0.9.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:thrift:0.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:thrift:0.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:thrift:0.11.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:thrift:0.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:thrift:0.12.0:*:*:*:*:-:*:*
  • AND
  • cpe:/a:ibm:cognos_analytics:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:10.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:10.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.4:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apache thrift *
    redhat jboss enterprise application platform 7.2.0
    redhat enterprise linux server 7.0
    redhat enterprise linux server 6.0
    redhat enterprise linux server 8.0
    oracle communications cloud native core network slice selection function 1.2.1
    apache thrift 0.9.2
    apache thrift 0.9.3
    apache thrift 0.5.0
    apache thrift 0.6.0
    apache thrift 0.11.0
    apache thrift 0.6.1
    apache thrift 0.12.0
    ibm cognos analytics 11.0
    ibm security guardium 10.5
    ibm security guardium 10.6
    ibm cognos analytics 11.1
    ibm security guardium 11.0
    ibm security guardium 11.1
    ibm security guardium 11.2
    ibm security guardium 11.3
    ibm security guardium 11.4