CVE-2019-16159Out-of-bounds Write in Bird

Severity
7.5HIGHNVD
EPSS
5.3%
top 9.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 9
Latest updateMay 24

Description

BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

Debianbird_project/bird< 1.6.8-1+1
NVDnic/bird1.6.01.6.7+1

Also affects: Debian Linux 10.0, Fedora 29, 30

Patches

🔴Vulnerability Details

3
GHSA
GHSA-3fhp-jv43-7m9c: BIRD Internet Routing Daemon 12022-05-24
CVEList
CVE-2019-16159: BIRD Internet Routing Daemon 12019-09-09
OSV
CVE-2019-16159: BIRD Internet Routing Daemon 12019-09-09

📋Vendor Advisories

1
Debian
CVE-2019-16159: bird - BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a sta...2019

💬Community

4
Bugzilla
CVE-2019-16159 bird: incorrect logical expressionwhen checking the validity of an input message leads to stack-based buffer overflow [fedora-all]2019-09-11
Bugzilla
CVE-2019-16159 bird: incorrect logical expressionwhen checking the validity of an input message leads to stack-based buffer overflow [epel-all]2019-09-11
Bugzilla
CVE-2019-16159 bird: incorrect logical expressionwhen checking the validity of an input message leads to stack-based buffer overflow2019-09-11
Bugzilla
CVE-2019-16159 bird2: bird: incorrect logical expressionwhen checking the validity of an input message leads to stack-based buffer overflow [epel-all]2019-09-11
CVE-2019-16159 — Out-of-bounds Write in NIC Bird | cvebase