CVE-2019-1010232

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-1010232
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-1010232.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-1010232
Published
2019-07-22T16:15:11Z
Modified
2025-01-08T05:34:44.103290Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Juniper juniper/libslax libslax latest version (as of commit 084ddf6ab4a55b59dfa9a53f9c5f14d192c4f8e5 Commits on Sep 1, 2018) is affected by: Buffer Overflow. The impact is: remote dos. The component is: slaxlexer.c:601(funtion:slaxGetInput). The attack vector is: ./slaxproc --slax-to-xslt POC0.

References

Affected packages

Git / github.com/juniper/libslax

Affected ranges

Type
GIT
Repo
https://github.com/juniper/libslax
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.16.0
0.16.1
0.16.10
0.16.11
0.16.12
0.16.13
0.16.14
0.16.15
0.16.16
0.16.17
0.16.18
0.16.2
0.16.3
0.16.6
0.16.7
0.16.8
0.16.9
0.17.0
0.17.1
0.17.2
0.17.3
0.18.0
0.18.1
0.19.0
0.20.0
0.20.1
0.20.2
0.21.0
0.21.1
0.21.2
0.22.0

libslax-0.*

libslax-0.16.0

Other

sync-develop
test2
testing

v0.*

v0.15.0