First published: Mon Jul 22 2019(Updated: )
Juniper juniper/libslax libslax latest version (as of commit 084ddf6ab4a55b59dfa9a53f9c5f14d192c4f8e5 Commits on Sep 1, 2018) is affected by: Buffer Overflow. The impact is: remote dos. The component is: slaxlexer.c:601(funtion:slaxGetInput). The attack vector is: ./slaxproc --slax-to-xslt POC0.
Credit: josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Libslax | =0.22.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1010232 has a high severity rating due to the potential for remote denial of service (DoS) attacks.
To mitigate CVE-2019-1010232, it is recommended to update to a patched version of Juniper libslax that addresses the buffer overflow vulnerability.
CVE-2019-1010232 specifically affects Juniper libslax version 0.22.0.
The vulnerability in CVE-2019-1010232 is found in the slaxlexer.c file, specifically at line 601 in the function slaxGetInput.
The attack vector for CVE-2019-1010232 involves executing the command './slaxproc --slax-to-xslt POC0'.