Vulnerability Name:

CVE-2019-16159

Assigned:2019-09-09
Published:2019-09-09
Updated:2022-04-18
Summary:BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-787
References:Source: MISC
Type: Vendor Advisory
http://bird.network.cz

Source: MITRE
Type: CNA
CVE-2019-16159

Source: SUSE
Type: Mailing List, Third Party Advisory
openSUSE-SU-2019:2178

Source: SUSE
Type: Mailing List, Third Party Advisory
openSUSE-SU-2019:2180

Source: MISC
Type: Vendor Advisory
http://trubka.network.cz/pipermail/bird-users/2019-September/013718.html

Source: MISC
Type: Vendor Advisory
http://trubka.network.cz/pipermail/bird-users/2019-September/013720.html

Source: MISC
Type: Vendor Advisory
http://trubka.network.cz/pipermail/bird-users/2019-September/013722.html

Source: MISC
Type: Patch, Third Party Advisory
https://gitlab.labs.nic.cz/labs/bird/commit/1657c41c96b3c07d9265b07dd4912033ead4124b

Source: MISC
Type: Patch, Third Party Advisory
https://gitlab.labs.nic.cz/labs/bird/commit/8388f5a7e14108a1458fea35bfbb5a453e2c563c

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2019-ace80f492e

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2019-b629e3b97f

Source: BUGTRAQ
Type: Mailing List, Third Party Advisory
20190920 [SECURITY] [DSA 4528-1] bird security update

Source: DEBIAN
Type: Third Party Advisory
DSA-4528

Vulnerable Configuration:Configuration 1:
  • cpe:/a:nic:bird:*:*:*:*:*:*:*:* (Version >= 2.0.0 and <= 2.0.5)
  • OR cpe:/a:nic:bird:*:*:*:*:*:*:*:* (Version >= 1.6.0 and <= 1.6.7)

  • Configuration 2:
  • cpe:/a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:fedoraproject:fedora:29:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:30:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:93468
    P
    (Important)
    2022-07-06
    oval:org.opensuse.security:def:201916159
    V
    CVE-2019-16159
    2022-06-30
    oval:org.opensuse.security:def:112008
    P
    bird-2.0.8-2.2 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:74381
    P
    Security update for webkit2gtk3 (Important)
    2021-10-12
    oval:org.opensuse.security:def:105565
    P
    bird-2.0.8-2.2 on GA media (Moderate)
    2021-10-01
    oval:org.opensuse.security:def:63128
    P
    python-azure-agent-2.2.49.2-3.20.1 on GA media (Moderate)
    2021-08-10
    oval:org.opensuse.security:def:63492
    P
    libreoffice-7.1.2.2-2.3 on GA media (Moderate)
    2021-08-10
    oval:org.opensuse.security:def:62470
    P
    libsoup-devel-2.62.2-1.9 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:63266
    P
    gtk-vnc-devel-1.0.0-2.35 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:62647
    P
    imlib2-loaders-1.4.10-1.28 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:62446
    P
    libimobiledevice-devel-1.2.0+git20170122.45fda81-1.44 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:62926
    P
    subversion-bash-completion-1.10.0-3.3.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:62447
    P
    libjasper-devel-2.0.14-1.19 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:64203
    P
    ruby2.5-rubygem-railties-5_1 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:63953
    P
    Security update for ed (Low)
    2020-12-01
    oval:org.opensuse.security:def:64315
    P
    libXxf86vm-devel on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:64059
    P
    Security update for webkit2gtk3 (Important)
    2020-12-01
    oval:org.opensuse.security:def:74255
    P
    Security update for ImageMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:64161
    P
    Security update for freetype2 (Important)
    2020-12-01
    oval:org.opensuse.security:def:63819
    P
    Security update for apache2-mod_auth_openidc (Important)
    2020-12-01
    oval:org.opensuse.security:def:100181
    P
    Security update for bird (Moderate)
    2019-09-24
    oval:org.opensuse.security:def:110005
    P
    Security update for bird (Moderate)
    2019-09-24
    oval:com.ubuntu.disco:def:2019161590000000
    V
    CVE-2019-16159 on Ubuntu 19.04 (disco) - medium.
    2019-09-09
    BACK
    nic bird *
    nic bird *
    opensuse backports sle 15.0 sp1
    fedoraproject fedora 29
    fedoraproject fedora 30
    debian debian linux 10.0