Search for vulnerabilities
Vulnerability details: VCID-mn2e-rngd-aaae
Vulnerability ID VCID-mn2e-rngd-aaae
Aliases CVE-2019-1010305
Summary libmspack 0.9.1alpha is affected by: Buffer Overflow. The impact is: Information Disclosure. The component is: function chmd_read_headers() in libmspack(file libmspack/mspack/chmd.c). The attack vector is: the victim must open a specially crafted chm file. The fixed version is: after commit 2f084136cfe0d05e5bf5703f3e83c6d955234b4d.
Status Published
Exploitability 0.5
Weighted Severity 5.0
Risk 2.5
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
rhas Low https://access.redhat.com/errata/RHSA-2020:1686
rhas Low https://access.redhat.com/errata/RHSA-2020:3848
cvssv3 2.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010305.json
epss 0.00133 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00133 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00133 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00478 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.00536 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
epss 0.01318 https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1730568
cvssv3 2.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2019-1010305
cvssv3 5.5 https://nvd.nist.gov/vuln/detail/CVE-2019-1010305
cvssv3.1 5.5 https://nvd.nist.gov/vuln/detail/CVE-2019-1010305
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010305.json
https://api.first.org/data/v1/epss?cve=CVE-2019-1010305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010305
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/kyz/libmspack/commit/2f084136cfe0d05e5bf5703f3e83c6d955234b4d
https://github.com/kyz/libmspack/issues/27
https://lists.debian.org/debian-lts-announce/2019/08/msg00028.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IXWNEY4CJBLPRKV6LG7FQUPD6WVZYBTB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2QJTUAGP22YY7453MHGTFN4YQE5HJBR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXWNEY4CJBLPRKV6LG7FQUPD6WVZYBTB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2QJTUAGP22YY7453MHGTFN4YQE5HJBR/
https://usn.ubuntu.com/4066-1/
https://usn.ubuntu.com/4066-2/
1730568 https://bugzilla.redhat.com/show_bug.cgi?id=1730568
cpe:2.3:a:kyzer:libmspack:0.9.1:alpha:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kyzer:libmspack:0.9.1:alpha:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
CVE-2019-1010305 https://nvd.nist.gov/vuln/detail/CVE-2019-1010305
RHSA-2020:1686 https://access.redhat.com/errata/RHSA-2020:1686
RHSA-2020:3848 https://access.redhat.com/errata/RHSA-2020:3848
No exploits are available.
Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010305.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-1010305
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-1010305
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-1010305
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.49036
EPSS Score 0.00133
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.