Vulnerability Description
An integer overflow in whoopsie before versions 0.2.52.5ubuntu0.1, 0.2.62ubuntu0.1, 0.2.64ubuntu0.1, 0.2.66, results in an out-of-bounds write to a heap allocated buffer when processing large crash dumps. This results in a crash or possible code-execution in the context of the whoopsie process.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 16.04 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-O
- https://bugs.launchpad.net/ubuntu/%2Bsource/whoopsie/%2Bbug/1830863ExploitIssue TrackingVendor Advisory
- https://usn.ubuntu.com/4052-1/ExploitVendor Advisory
- http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-O
- https://bugs.launchpad.net/ubuntu/%2Bsource/whoopsie/%2Bbug/1830863ExploitIssue TrackingVendor Advisory
- https://usn.ubuntu.com/4052-1/ExploitVendor Advisory
FAQ
What is CVE-2019-11476?
CVE-2019-11476 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An integer overflow in whoopsie before versions 0.2.52.5ubuntu0.1, 0.2.62ubuntu0.1, 0.2.64ubuntu0.1, 0.2.66, results in an out-of-bounds write to a heap allocated buffer when processing large crash du...
How severe is CVE-2019-11476?
CVE-2019-11476 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-11476?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux.