Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-18197 |
CWE-ID | CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
libxslt (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU21942
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2019-18197
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the xsltCopyText() function in transform.c in libxslt. A remote attacker can create a specially crafted XML document, pass it to the affected application, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionslibxslt (Alpine package): 1.1.31-r1
CPE2.3 External linkshttps://git.alpinelinux.org/aports/commit/?id=cab2f7460bc61617445a4f921c14b6b9d8ec0e0a
https://git.alpinelinux.org/aports/commit/?id=07f84335ced6f486514d7acae830837a5a619385
https://git.alpinelinux.org/aports/commit/?id=28721ac7a17afb3d209cb0d49d4bece3d6c9179d
https://git.alpinelinux.org/aports/commit/?id=36f4bd78050ec6ce2ad65444031df6c1f3db5cc9
https://git.alpinelinux.org/aports/commit/?id=d67f5711d1824ce0ddb4568df672ae2976f81f58
https://git.alpinelinux.org/aports/commit/?id=15d065f8bf5e73b1d88ca046d99933d217781aab
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.