CVE-2019-18224
Summary
| CVE | CVE-2019-18224 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-10-21 17:15:00 UTC |
| Updated | 2023-11-07 03:06:00 UTC |
| Description | idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Debian -- Security Information -- DSA-4613-1 libidn2 | DEBIAN | www.debian.org | |
| 12420 - oss-fuzz - OSS-Fuzz: Fuzzing the planet - Monorail | MISC | bugs.chromium.org | Exploit, Issue Tracking, Third Party Advisory |
| GNU IDN Library 2: Multiple vulnerabilities (GLSA 202003-63) — Gentoo security | GENTOO | security.gentoo.org | |
| [security-announce] openSUSE-SU-2019:2613-1: moderate: Security update f | SUSE | lists.opensuse.org | |
| [SECURITY] Fedora 29 Update: mingw-libidn2-2.2.0-1.fc29 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| [SECURITY] Fedora 30 Update: mingw-libidn2-2.2.0-1.fc30 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | |
| [security-announce] openSUSE-SU-2019:2611-1: moderate: Security update f | SUSE | lists.opensuse.org | |
| [SECURITY] Fedora 30 Update: mingw-libidn2-2.2.0-1.fc30 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| USN-4168-1: Libidn2 vulnerabilities | Ubuntu security notices | UBUNTU | usn.ubuntu.com | |
| [SECURITY] Fedora 29 Update: mingw-libidn2-2.2.0-1.fc29 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | |
| Comparing libidn2-2.1.0...libidn2-2.1.1 · libidn/libidn2 · GitHub | MISC | github.com | Release Notes, Third Party Advisory |
| Bugtraq: [SECURITY] [DSA 4613-1] libidn2 security update | BUGTRAQ | seclists.org | |
| idn2_to_ascii_4i(): Restrict output length to 63 · libidn/libidn2@e4d1558 · GitHub | MISC | github.com | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.