668
VMScore

CVE-2019-19333

Published: 06/12/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In all versions of libyang prior to 1.0-r5, a stack-based buffer overflow exists in the way libyang parses YANG files with a leaf of type "bits". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an malicious user to cause a denial of service or possibly gain code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cesnet libyang 1.0

cesnet libyang 0.16

cesnet libyang 0.13

cesnet libyang 0.12

cesnet libyang 0.11

cesnet libyang 0.14

cesnet libyang 0.15

redhat enterprise linux 8.0

Vendor Advisories

Synopsis Important: libyang security update Type/Severity Security Advisory: Important Topic An update for libyang is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, ...
Debian Bug report logs - #946217 CVE-2019-19333 & CVE-2019-19334 in libyang Package: libyang016; Maintainer for libyang016 is David Lamparter <equinox-debian@diac24net>; Source for libyang016 is src:libyang (PTS, buildd, popcon) Reported by: David Lamparter <equinox-debian@diac24net> Date: Thu, 5 Dec 2019 1 ...