Vulnerability Description
usrsctp before 2019-12-20 has out-of-bounds reads in sctp_load_addresses_from_init.
CVSS Score
6.5
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Usrsctp Project | Usrsctp | < 0.9.4.0 |
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 16.04 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.htmlMailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2020/May/49Mailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2020/May/52Mailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2020/May/55Mailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2020/May/59Mailing ListThird Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0815Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0816Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0819Third Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0820Third Party Advisory
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1992ExploitPatchVendor Advisory
- https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_Third Party Advisory
- https://crbug.com/1059349Third Party Advisory
FAQ
What is CVE-2019-20503?
CVE-2019-20503 is a vulnerability with a CVSS score of 6.5 (MEDIUM). usrsctp before 2019-12-20 has out-of-bounds reads in sctp_load_addresses_from_init.
How severe is CVE-2019-20503?
CVE-2019-20503 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-20503?
Check the references section above for vendor advisories and patch information. Affected products include: Usrsctp Project Usrsctp, Debian Debian Linux, Canonical Ubuntu Linux.