9.8
CVSSv3

CVE-2019-16239

Published: 17/09/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

process_http_response in OpenConnect prior to 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

infradead openconnect

fedoraproject fedora 29

fedoraproject fedora 30

fedoraproject fedora 31

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

canonical ubuntu linux 18.04

opensuse leap 15.0

opensuse leap 15.1

Vendor Advisories

Debian Bug report logs - #940871 openconnect: CVE-2019-16239: Fix buffer overflow with chunked HTTP handling Package: src:openconnect; Maintainer for src:openconnect is Mike Miller <mtmiller@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 21 Sep 2019 06:36:01 UTC Severity: grave Tags: se ...
Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP in openconnect, an open client for Cisco AnyConnect, Pulse and GlobalProtect VPN A malicious HTTP server (after having accepted its identity certificate), can provide bogus chunk lengths for chunked HTTP encoding and cause a heap-based buffer overflow For the oldstable distrib ...