CVE-2019-1372Microsoft Azure APP Service ON Azure Stack vulnerability

4 documents4 sources
Severity
10.0CRITICALNVD
EPSS
3.3%
top 12.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 10
Latest updateMay 24

Description

An remote code execution vulnerability exists when Azure App Service/ Antares on Azure Stack fails to check the length of a buffer prior to copying memory to it.An attacker who successfully exploited this vulnerability could allow an unprivileged function run by the user to execute code in the context of NT AUTHORITY\system thereby escaping the Sandbox.The security update addresses the vulnerability by ensuring that Azure App Service sanitizes user inputs., aka 'Azure App Service Remote Code Exe

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0

Affected Packages2 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-649f-8c3w-9g8g: An remote code execution vulnerability exists when Azure App Service/ Antares on Azure Stack fails to check the length of a buffer prior to copying me2022-05-24
CVEList
CVE-2019-1372: An remote code execution vulnerability exists when Azure App Service/ Antares on Azure Stack fails to check the length of a buffer prior to copying me2019-10-10

📋Vendor Advisories

1
Microsoft
Azure Stack Remote Code Execution Vulnerability2019-10-08
CVE-2019-1372 — Microsoft vulnerability | cvebase