Vulnerability Description
In FreeBSD 12.0-STABLE before r349622, 12.0-RELEASE before 12.0-RELEASE-p7, 11.3-PRERELEASE before r349624, 11.3-RC3 before 11.3-RC3-p1, and 11.2-RELEASE before 11.2-RELEASE-p11, a bug in iconv implementation may allow an attacker to write past the end of an output buffer. Depending on the implementation, an attacker may be able to create a denial of service, provoke incorrect program behavior, or induce a remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 11.2 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/153520/FreeBSD-Security-Advisory-FreeBSD-SAThird Party AdvisoryVDB Entry
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:09.iconv.ascVendor Advisory
- http://packetstormsecurity.com/files/153520/FreeBSD-Security-Advisory-FreeBSD-SAThird Party AdvisoryVDB Entry
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:09.iconv.ascVendor Advisory
FAQ
What is CVE-2019-5600?
CVE-2019-5600 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In FreeBSD 12.0-STABLE before r349622, 12.0-RELEASE before 12.0-RELEASE-p7, 11.3-PRERELEASE before r349624, 11.3-RC3 before 11.3-RC3-p1, and 11.2-RELEASE before 11.2-RELEASE-p11, a bug in iconv implem...
How severe is CVE-2019-5600?
CVE-2019-5600 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-5600?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.