First published: Wed May 01 2019(Updated: )
An issue was discovered in GNU recutils 1.8. There is a stack-based buffer overflow in the function rec_type_check_enum at rec-types.c in librec.a.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Recutils | =1.8 | |
debian/recutils | <=1.8-1<=1.9-2<=1.9-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11639 has been classified as a high severity vulnerability due to its potential to cause a stack-based buffer overflow.
To mitigate CVE-2019-11639, upgrade GNU recutils to version 1.9 or later, which resolves this buffer overflow issue.
CVE-2019-11639 affects GNU Recutils version 1.8 and earlier.
CVE-2019-11639 is a stack-based buffer overflow vulnerability found in GNU Recutils.
CVE-2019-11639 can lead to arbitrary code execution, which poses significant risks to the security of affected systems.