5.9
CVSSv3

CVE-2019-16779

Published: 16/12/2019 Updated: 28/10/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

In RubyGem excon prior to 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

excon project excon

opensuse backports sle 15.0

opensuse leap 15.1

debian debian linux 8.0

Vendor Advisories

Debian Bug report logs - #946904 ruby-excon: CVE-2019-16779 Package: src:ruby-excon; Maintainer for src:ruby-excon is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 17 Dec 2019 15:51:02 UTC Severity: important Tags ...