Vulnerability Name:
CVE-2019-25013 (CCN-194579)
Assigned:
2019-09-06
Published:
2019-09-06
Updated:
2022-11-03
Summary:
The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.
CVSS v3 Severity:
5.9 Medium
(CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
)
5.2 Medium
(Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
None
Availibility (A):
High
7.5 High
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
)
6.5 Medium
(CCN Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
None
Availibility (A):
High
4.8 Medium
(REDHAT CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
)
4.2 Medium
(REDHAT Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
Low
User Interaction (UI):
Required
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
None
Availibility (A):
High
CVSS v2 Severity:
7.1 High
(CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
None
Availibility (A):
Complete
7.8 High
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
None
Availibility (A):
Complete
Vulnerability Type:
CWE-125
CWE-119
Vulnerability Consequences:
Denial of Service
References:
Source: MITRE
Type: CNA
CVE-2019-25013
Source: XF
Type: UNKNOWN
gnu-glibc-cve201925013-dos(194579)
Source: MLIST
Type: Mailing List, Third Party Advisory
[kafka-jira] 20210420 [jira] [Created] (KAFKA-12698) CVE-2019-25013 vulnerability reported in Kafka
Source: MLIST
Type: Mailing List, Third Party Advisory
[kafka-dev] 20210420 [jira] [Created] (KAFKA-12698) CVE-2019-25013 vulnerability reported in Kafka
Source: MLIST
Type: Mailing List, Third Party Advisory
[kafka-jira] 20210423 [jira] [Comment Edited] (KAFKA-12698) CVE-2019-25013 high priority vulnerability reported in Kafka
Source: MLIST
Type: Mailing List, Third Party Advisory
[kafka-jira] 20210423 [jira] [Commented] (KAFKA-12698) CVE-2019-25013 high priority vulnerability reported in Kafka
Source: MLIST
Type: Mailing List, Third Party Advisory
[kafka-jira] 20210423 [jira] [Updated] (KAFKA-12698) CVE-2019-25013 high priority vulnerability reported in Kafka
Source: MLIST
Type: Mailing List, Third Party Advisory
[zookeeper-issues] 20210423 [jira] [Created] (ZOOKEEPER-4285) High CVE-2019-25013 reported by Clair scanner for Zookeeper 3.6.1
Source: MLIST
Type: Mailing List, Third Party Advisory
[zookeeper-dev] 20210423 [jira] [Created] (ZOOKEEPER-4285) High CVE-2019-25013 reported by Clair scanner for Zookeeper 3.6.1
Source: MLIST
Type: Mailing List, Third Party Advisory
[zookeeper-issues] 20210506 [jira] [Resolved] (ZOOKEEPER-4285) High CVE-2019-25013 reported by Clair scanner for Zookeeper 3.6.1
Source: MLIST
Type: Mailing List, Third Party Advisory
[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-6feb090c97
Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-6e581c051a
Source: GENTOO
Type: Third Party Advisory
GLSA-202107-07
Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20210205-0004/
Source: CCN
Type: Sourceware Bugzilla Bug 24973
(CVE-2019-25013) - iconv encounters segmentation fault when converting 0x00 0xfe in EUC-KR to UTF-8 (CVE-2019-25013)
Source: MISC
Type: Issue Tracking, Patch, Third Party Advisory
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
Source: CCN
Type: glibc.git Repository
Fix buffer overrun in EUC-KR conversion module (bz #24973)
Source: MISC
Type: Patch, Third Party Advisory
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
Source: CCN
Type: IBM Security Bulletin 6453115 (Cloud Pak for Security)
Cloud Pak for Security contains security vulnerabilities
Source: CCN
Type: IBM Security Bulletin 6493729 (Cloud Pak for Security)
Cloud Pak for Security is vulnerable to several CVEs
Source: CCN
Type: IBM Security Bulletin 6520474 (QRadar SIEM)
IBM QRadar SIEM Application Framework Base Image is vulnerable to using components with Known Vulnerabilities
Source: CCN
Type: IBM Security Bulletin 6538418 (Security Verify Access)
Multiple Security Vulnerabilities fixed in IBM Security Verify Access
Source: CCN
Type: IBM Security Bulletin 6853463 (Robotic Process Automation for Cloud Pak)
Multiple Security Vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak.
Source: CCN
Type: IBM Security Bulletin 6982841 (Netcool Operations Insight)
Netcool Operations Insight v1.6.8 addresses multiple security vulnerabilities.
Source: MISC
Type: Not Applicable
https://www.oracle.com/security-alerts/cpuapr2022.html
Vulnerable Configuration:
Configuration 1
:
cpe:/a:gnu:glibc:*:*:*:*:*:*:*:*
(Version <= 2.32)
Configuration 2
:
cpe:/o:fedoraproject:fedora:32:*:*:*:*:*:*:*
OR
cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:*
Configuration 3
:
cpe:/a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
OR
cpe:/a:netapp:service_processor:-:*:*:*:*:*:*:*
OR
cpe:/o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*
Configuration 4
:
cpe:/o:netapp:baseboard_management_controller_a250_firmware:-:*:*:*:*:*:*:*
AND
cpe:/h:netapp:baseboard_management_controller_a250:-:*:*:*:*:*:*:*
Configuration 5
:
cpe:/o:netapp:baseboard_management_controller_500f_firmware:-:*:*:*:*:*:*:*
AND
cpe:/h:netapp:baseboard_management_controller_500f:-:*:*:*:*:*:*:*
Configuration 6
:
cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Configuration RedHat 1
:
cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*
Configuration RedHat 2
:
cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*
Configuration RedHat 3
:
cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*
Configuration RedHat 4
:
cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*
Configuration RedHat 5
:
cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*
Configuration RedHat 6
:
cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*
Configuration RedHat 7
:
cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*
Configuration RedHat 8
:
cpe:/a:redhat:enterprise_linux:8::crb:*:*:*:*:*
Configuration RedHat 9
:
cpe:/o:redhat:enterprise_linux:8:*:*:*:*:*:*:*
Configuration RedHat 10
:
cpe:/o:redhat:enterprise_linux:8::baseos:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:ibm:qradar_security_information_and_event_manager:7.3:*:*:*:*:*:*:*
OR
cpe:/a:ibm:qradar_security_information_and_event_manager:7.4:-:*:*:*:*:*:*
OR
cpe:/a:ibm:security_verify_access:10.0.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:cloud_pak_for_security:1.4.0.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:security_verify_access:10.0.2.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:cloud_pak_for_security:1.6.0.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:cloud_pak_for_security:1.5.0.1:*:*:*:*:*:*:*
OR
cpe:/a:ibm:cloud_pak_for_security:1.5.0.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:cloud_pak_for_security:1.6.0.1:*:*:*:*:*:*:*
OR
cpe:/a:ibm:cloud_pak_for_security:1.7.0.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:cloud_pak_for_security:1.7.1.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:cloud_pak_for_security:1.7.2.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:security_verify_access:10.0.1.0:*:*:*:*:*:*:*
OR
cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.1:*:*:*:*:*:*:*
OR
cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.2:*:*:*:*:*:*:*
OR
cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.3:*:*:*:*:*:*:*
OR
cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.5:*:*:*:*:*:*:*
OR
cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.4:*:*:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:org.opensuse.security:def:93158
P
(Important)
2022-07-14
oval:org.opensuse.security:def:93311
P
(Important)
2022-07-08
oval:org.opensuse.security:def:3568
P
libXv1-1.0.10-7.1 on GA media (Moderate)
2022-06-28
oval:org.opensuse.security:def:94946
P
libical-devel-3.0.10-150400.1.8 on GA media (Moderate)
2022-06-22
oval:org.opensuse.security:def:94680
P
libp11-kit0-0.23.22-150400.1.10 on GA media (Moderate)
2022-06-22
oval:org.opensuse.security:def:101659
P
Security update for python-libxml2-python (Important)
2022-03-10
oval:org.opensuse.security:def:99203
P
(Important)
2022-01-25
oval:org.opensuse.security:def:112305
P
glibc-2.34-1.2 on GA media (Moderate)
2022-01-17
oval:org.opensuse.security:def:4537
P
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP5) (Important)
2021-12-14
oval:org.opensuse.security:def:102214
P
Security update for util-linux (Moderate)
2021-10-20
oval:org.opensuse.security:def:105828
P
glibc-2.34-1.2 on GA media (Moderate)
2021-10-01
oval:org.opensuse.security:def:101393
P
python3-virt-bootstrap-1.0.0-5.3.124 on GA media (Moderate)
2021-08-10
oval:org.opensuse.security:def:99398
P
(Moderate)
2021-07-20
oval:com.redhat.rhsa:def:20211585
P
RHSA-2021:1585: glibc security, bug fix, and enhancement update (Moderate)
2021-05-18
oval:org.opensuse.security:def:111242
P
Security update for glibc (Important)
2021-02-27
oval:org.opensuse.security:def:10398
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:8707
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:108325
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:93005
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:70348
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:9648
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:100108
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:92448
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:69594
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:73779
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:8897
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:108880
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:70538
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:64657
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:9847
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:95501
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:92647
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:69788
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:74694
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:117573
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:9092
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:99597
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:97247
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:92058
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:65626
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:10208
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:5953
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:99008
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:108059
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:92846
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:69987
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:76110
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:117839
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:9454
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:99796
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:92253
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:67042
P
Security update for glibc (Important)
2021-02-26
oval:org.opensuse.security:def:60462
P
Security update for glibc (Moderate)
2021-02-25
oval:org.opensuse.security:def:5187
P
Security update for glibc (Moderate)
2021-02-25
oval:org.opensuse.security:def:26200
P
Security update for glibc (Moderate)
2021-02-25
oval:org.opensuse.security:def:34639
P
Security update for glibc (Moderate)
2021-02-25
oval:com.redhat.rhsa:def:20210348
P
RHSA-2021:0348: glibc security and bug fix update (Moderate)
2021-02-02
BACK
gnu
glibc *
fedoraproject
fedora 32
fedoraproject
fedora 33
netapp
ontap select deploy administration utility -
netapp
service processor -
broadcom
fabric operating system -
netapp
baseboard management controller a250 firmware -
netapp
baseboard management controller a250 -
netapp
baseboard management controller 500f firmware -
netapp
baseboard management controller 500f -
debian
debian linux 10.0
ibm
qradar security information and event manager 7.3
ibm
qradar security information and event manager 7.4 -
ibm
security verify access 10.0.0
ibm
cloud pak for security 1.4.0.0
ibm
security verify access 10.0.2.0
ibm
cloud pak for security 1.6.0.0
ibm
cloud pak for security 1.5.0.1
ibm
cloud pak for security 1.5.0.0
ibm
cloud pak for security 1.6.0.1
ibm
cloud pak for security 1.7.0.0
ibm
cloud pak for security 1.7.1.0
ibm
cloud pak for security 1.7.2.0
ibm
security verify access 10.0.1.0
ibm
robotic process automation for cloud pak 21.0.1
ibm
robotic process automation for cloud pak 21.0.2
ibm
robotic process automation for cloud pak 21.0.3
ibm
robotic process automation for cloud pak 21.0.5
ibm
robotic process automation for cloud pak 21.0.4