First published: Mon Jul 01 2019(Updated: )
In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libxslt | 1.1.34-4+deb11u1 1.1.35-1 1.1.35-1.1 | |
libxslt | =1.1.33 | |
Debian GNU/Linux | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
Ubuntu Linux | =19.10 | |
Fedoraproject Fedora | =31 | |
openSUSE | =15.1 | |
Oracle OpenJDK | =8-update231 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-13117.
The severity level of CVE-2019-13117 is medium with a CVSS score of 5.3.
CVE-2019-13117 affects libxslt 1.1.33 as well as certain versions of Debian Linux, Ubuntu Linux, Fedora, OpenSUSE, and Oracle OpenJDK.
CVE-2019-13117 could allow an attacker to discern the contents of a byte on the stack, potentially compromising the confidentiality of sensitive information.
You can find more information about CVE-2019-13117 at the following references: [http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html), [http://www.openwall.com/lists/oss-security/2019/11/17/2](http://www.openwall.com/lists/oss-security/2019/11/17/2), [https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14471](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14471).