Vulnerability Description
VCFTools vcftools prior to version 0.1.15 is affected by: Use-after-free. The impact is: Denial of Service or possibly other impact (eg. code execution or information disclosure). The component is: The header::add_FILTER_descriptor method in header.cpp. The attack vector is: The victim must open a specially crafted VCF file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vcftools Project | Vcftools | < 0.1.15 |
Related Weaknesses (CWE)
References
- https://docs.google.com/document/d/e/2PACX-1vQJveVcGMp_NMdBY5Je2K2k63RoCYznvKjJkExploitThird Party Advisory
- https://github.com/vcftools/vcftools/issues/141
- https://docs.google.com/document/d/e/2PACX-1vQJveVcGMp_NMdBY5Je2K2k63RoCYznvKjJkExploitThird Party Advisory
- https://github.com/vcftools/vcftools/issues/141
FAQ
What is CVE-2019-1010127?
CVE-2019-1010127 is a vulnerability with a CVSS score of 7.8 (HIGH). VCFTools vcftools prior to version 0.1.15 is affected by: Use-after-free. The impact is: Denial of Service or possibly other impact (eg. code execution or information disclosure). The component is: Th...
How severe is CVE-2019-1010127?
CVE-2019-1010127 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-1010127?
Check the references section above for vendor advisories and patch information. Affected products include: Vcftools Project Vcftools.