CVE-2019-6964

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2019-6964
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-6964.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-6964
Published
2019-06-20T14:15:11Z
Modified
2024-09-03T02:55:39.187280Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A heap-based buffer over-read in ServiceSetParamStringValue in cosaxciscocomddnsdml.c of the RDK RDKB-20181217-1 CcspPandM module may allow attackers with login credentials to achieve information disclosure and code execution by crafting an AJAX call responsible for DDNS configuration with an exactly 64-byte username, password, or domain, for which the buffer size is insufficient for the final '\0' character. This is related to the CcspCommonLibrary and WebUI modules.

References

Affected packages

Git / github.com/rdkcmf/rdkb-ccsppandm

Affected ranges

Type
GIT
Repo
https://github.com/rdkcmf/rdkb-ccsppandm
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

IMPORT_INITIAL
RDKB-20181114
RDKB-20181114-1
RDKB-20181115
RDKB-20181217
RDKB-20181217-1