| Vulnerability Name: | CVE-2019-13455 (CCN-166019) | ||||||||||||||||
| Assigned: | 2019-07-23 | ||||||||||||||||
| Published: | 2019-07-23 | ||||||||||||||||
| Updated: | 2020-08-24 | ||||||||||||||||
| Summary: | In Xymon through 4.3.28, a stack-based buffer overflow vulnerability exists in the alert acknowledgment CGI tool because of expansion in acknowledge.c. | ||||||||||||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||
| Vulnerability Type: | CWE-787 | ||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2019-13455 Source: XF Type: UNKNOWN xymon-cve201913455-bo(166019) Source: MISC Type: Third Party Advisory https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/acknowledge.c Source: CONFIRM Type: Mailing List, Third Party Advisory https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html Source: CCN Type: Xymon Web site [Xymon] Xymon 4.3.29 Released - Important Security Update Source: CONFIRM Type: Exploit, Mailing List, Vendor Advisory https://lists.xymon.com/archive/2019-July/046570.html | ||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
| Oval Definitions | |||||||||||||||||
| |||||||||||||||||
| BACK | |||||||||||||||||