6.8
CVSSv2

CVE-2019-14541

Published: 02/08/2019 Updated: 24/08/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

GnuCOBOL 2.2 has a stack-based buffer overflow in cb_encode_program_id in cobc/typeck.c via crafted COBOL source code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnucobol project gnucobol 2.2

Vendor Advisories

Debian Bug report logs - #933884 CVE-2019-14541 CVE-2019-14528 CVE-2019-14486 CVE-2019-14468 Package: src:gnucobol; Maintainer for src:gnucobol is Ludwin Janvier <ludjanvier@gmailcom>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sun, 4 Aug 2019 20:36:01 UTC Severity: important Tags: security, upstream ...