5
CVSSv2

CVE-2019-16159

Published: 09/09/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

BIRD Internet Routing Daemon 1.6.x up to and including 1.6.7 and 2.x up to and including 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nic bird

opensuse backports sle 15.0

fedoraproject fedora 29

fedoraproject fedora 30

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #939990 bird: CVE-2019-16159 Package: src:bird; Maintainer for src:bird is Ondřej Surý <ondrej@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 10 Sep 2019 20:06:02 UTC Severity: grave Tags: security, upstream Found in versions bird/167-1, bird/166-1 For ...
Daniel McCarney discovered that the BIRD internet routing daemon incorrectly validated RFC 8203 messages in it's BGP daemon, resulting in a stack buffer overflow For the stable distribution (buster), this problem has been fixed in version 166-1+deb10u1 In addition this update fixes an incomplete revocation of privileges and a crash triggerable ...