cve-2019-14851
Vulnerability from cvelistv5
Published
2021-03-18 19:04
Modified
2024-08-05 00:26
Severity ?
EPSS score ?
Summary
A denial of service vulnerability was discovered in nbdkit. A client issuing a certain sequence of commands could possibly trigger an assertion failure, causing nbdkit to exit. This issue only affected nbdkit versions 1.12.7, 1.14.1, and 1.15.1.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1757259 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html | Mailing List, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1757259 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html | Mailing List, Patch, Vendor Advisory |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T00:26:39.132Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1757259", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "nbdkit", vendor: "n/a", versions: [ { status: "affected", version: "nbdkit 1.12.8, nbdkit 1.14.2, nbdkit 1.15.2", }, ], }, ], descriptions: [ { lang: "en", value: "A denial of service vulnerability was discovered in nbdkit. A client issuing a certain sequence of commands could possibly trigger an assertion failure, causing nbdkit to exit. This issue only affected nbdkit versions 1.12.7, 1.14.1, and 1.15.1.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-617", description: "CWE-617", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-03-18T19:04:21", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1757259", }, { tags: [ "x_refsource_MISC", ], url: "https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2019-14851", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "nbdkit", version: { version_data: [ { version_value: "nbdkit 1.12.8, nbdkit 1.14.2, nbdkit 1.15.2", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A denial of service vulnerability was discovered in nbdkit. A client issuing a certain sequence of commands could possibly trigger an assertion failure, causing nbdkit to exit. This issue only affected nbdkit versions 1.12.7, 1.14.1, and 1.15.1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-617", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1757259", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1757259", }, { name: "https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html", refsource: "MISC", url: "https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2019-14851", datePublished: "2021-03-18T19:04:21", dateReserved: "2019-08-10T00:00:00", dateUpdated: "2024-08-05T00:26:39.132Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nbdkit_project:nbdkit:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.12.7\", \"matchCriteriaId\": \"A063E03B-A7F8-4485-AC7A-670482AABDB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nbdkit_project:nbdkit:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.14.0\", \"versionEndExcluding\": \"1.14.1\", \"matchCriteriaId\": \"9E34640C-18B4-4C3F-BA2E-EB55137D0F6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nbdkit_project:nbdkit:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.15.0\", \"versionEndExcluding\": \"1.15.1\", \"matchCriteriaId\": \"45F3323B-D58A-4029-B8E4-A265571EE38C\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"A denial of service vulnerability was discovered in nbdkit. A client issuing a certain sequence of commands could possibly trigger an assertion failure, causing nbdkit to exit. This issue only affected nbdkit versions 1.12.7, 1.14.1, and 1.15.1.\"}, {\"lang\": \"es\", \"value\": \"Se detect\\u00f3 una vulnerabilidad de denegaci\\u00f3n de servicio en nbdkit. Un cliente que emita una determinada secuencia de comandos podr\\u00eda desencadenar un fallo de aserci\\u00f3n, causando la salida de nbdkit. Este problema solo afect\\u00f3 a versiones 1.12.7, 1.14.1 y 1.15.1 de nbdkit\"}]", id: "CVE-2019-14851", lastModified: "2024-11-21T04:27:29.870", metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:N/I:N/A:P\", \"baseScore\": 3.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 6.8, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2021-03-18T20:15:12.550", references: "[{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1757259\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1757259\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Patch\", \"Vendor Advisory\"]}]", sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"secalert@redhat.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-617\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2019-14851\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2021-03-18T20:15:12.550\",\"lastModified\":\"2024-11-21T04:27:29.870\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A denial of service vulnerability was discovered in nbdkit. A client issuing a certain sequence of commands could possibly trigger an assertion failure, causing nbdkit to exit. This issue only affected nbdkit versions 1.12.7, 1.14.1, and 1.15.1.\"},{\"lang\":\"es\",\"value\":\"Se detectó una vulnerabilidad de denegación de servicio en nbdkit. Un cliente que emita una determinada secuencia de comandos podría desencadenar un fallo de aserción, causando la salida de nbdkit. Este problema solo afectó a versiones 1.12.7, 1.14.1 y 1.15.1 de nbdkit\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:N/A:P\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-617\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nbdkit_project:nbdkit:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.12.7\",\"matchCriteriaId\":\"A063E03B-A7F8-4485-AC7A-670482AABDB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nbdkit_project:nbdkit:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.14.0\",\"versionEndExcluding\":\"1.14.1\",\"matchCriteriaId\":\"9E34640C-18B4-4C3F-BA2E-EB55137D0F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nbdkit_project:nbdkit:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.15.0\",\"versionEndExcluding\":\"1.15.1\",\"matchCriteriaId\":\"45F3323B-D58A-4029-B8E4-A265571EE38C\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1757259\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1757259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/libguestfs/2019-September/msg00272.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]}]}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.