First published: Mon Jul 01 2019(Updated: )
In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.
Credit: found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | <12.9.6 | 12.9.6 |
Apple iCloud for Windows | <7.13 | 7.13 |
Apple iCloud for Windows | <10.6 | 10.6 |
Apple watchOS | <5.3 | 5.3 |
Apple macOS Mojave | <10.14.6 | 10.14.6 |
Apple High Sierra | ||
Apple Sierra | ||
Apple tvOS | <12.4 | 12.4 |
Apple iOS | <12.4 | 12.4 |
Xmlsoft Libxslt | =1.1.33 | |
openSUSE Leap | =15.1 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
Netapp Cloud Backup | ||
NetApp Clustered Data ONTAP | ||
Netapp E-series Performance Analyzer | ||
Netapp E-series Santricity Management Plug-ins Vmware Vcenter | ||
NetApp E-Series SANtricity OS Controller | >=11.0<=11.50.2 | |
Netapp E-series Santricity Storage Manager | ||
Netapp E-series Santricity Web Services Web Services Proxy | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
NetApp ONTAP Select Deploy administration utility | ||
Netapp Plug-in For Symantec Netbackup | ||
Netapp Santricity Unified Manager | ||
Netapp Steelstore Cloud Integrated Storage | ||
Oracle JDK | =1.8.0-update231 | |
Fedoraproject Fedora | =31 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
Apple Icloud Windows | <7.13 | |
Apple Icloud Windows | >=10.0<10.6 | |
Apple Itunes Windows | <12.9.6 | |
Apple iPhone OS | <12.4 | |
Apple Mac OS X | =10.12.6-security_update_2019-001 | |
Apple Mac OS X | =10.12.6-security_update_2019-002 | |
Apple Mac OS X | =10.12.6-security_update_2019-003 | |
Apple Mac OS X | =10.13.6-security_update_2019-001 | |
Apple Mac OS X | =10.13.6-security_update_2019-002 | |
Apple Mac OS X | =10.13.6-security_update_2019-003 | |
Apple macOS | >=10.4.6<10.14.6 | |
Apple tvOS | <12.4 | |
debian/libxslt | 1.1.34-4+deb11u1 1.1.35-1 1.1.35-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2019-13118 is a vulnerability in libxslt that allows for a stack overflow due to improved input validation.
The severity of CVE-2019-13118 is medium with a CVSS score of 5.3.
The affected software includes libxslt 1.1.33, opensuse leap 15.1, NetApp Active IQ Unified Manager, NetApp Cloud Backup, NetApp Clustered Data ONTAP, NetApp E-Series Performance Analyzer, NetApp E-Series SANtricity Management Plug-ins, NetApp E-Series SANtricity OS Controller (versions 11.0 to 11.50.2), NetApp E-Series SANtricity Storage Manager, NetApp E-Series SANtricity Web Services, NetApp OnCommand Insight, NetApp OnCommand Workflow Automation, NetApp ONTAP Select Deploy Administration Utility, NetApp Plug-in for Symantec NetBackup, NetApp SANtricity Unified Manager, NetApp SteelStore Cloud Integrated Storage, Oracle JDK 1.8.0-update231, Fedora 31, Canonical Ubuntu Linux 12.04 (ESM), 14.04 (ESM), 16.04 (ESM), 18.04 (LTS), 19.04, and 19.10, Apple iCloud for Windows (up to version 7.13 and between versions 10.0 to 10.6), Apple iTunes for Windows (up to version 12.9.6), Apple iPhone OS (up to version 12.4), Apple macOS (up to version 10.14.6), Apple tvOS (up to version 12.4), and Apple watchOS (up to version 5.3).
CVE-2019-13118 can lead to a stack overflow in libxslt 1.1.33 due to an invalid character/length combination passed to xsltNumberFormatDecimal, which can result in a read of uninitialized stack data.
Yes, there are references available for CVE-2019-13118. They can be found at the following URLs: [http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html) and [http://seclists.org/fulldisclosure/2019/Aug/11](http://seclists.org/fulldisclosure/2019/Aug/11).