CVE-2019-16159 — Out-of-bounds Write in Bird
Severity
7.5HIGHNVD
EPSS
5.3%
top 9.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 9
Latest updateMay 24
Description
BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
Also affects: Debian Linux 10.0, Fedora 29, 30
Patches
🔴Vulnerability Details
3📋Vendor Advisories
1Debian▶
CVE-2019-16159: bird - BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a sta...↗2019
💬Community
4Bugzilla▶
CVE-2019-16159 bird: incorrect logical expressionwhen checking the validity of an input message leads to stack-based buffer overflow [fedora-all]↗2019-09-11
Bugzilla▶
CVE-2019-16159 bird: incorrect logical expressionwhen checking the validity of an input message leads to stack-based buffer overflow [epel-all]↗2019-09-11
Bugzilla▶
CVE-2019-16159 bird: incorrect logical expressionwhen checking the validity of an input message leads to stack-based buffer overflow↗2019-09-11
Bugzilla▶
CVE-2019-16159 bird2: bird: incorrect logical expressionwhen checking the validity of an input message leads to stack-based buffer overflow [epel-all]↗2019-09-11