// For flags

CVE-2019-16200

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

GNU Serveez through 0.2.2 has an Information Leak. An attacker may send an HTTP POST request to the /cgi-bin/reader URI. The attacker must include a Content-length header with a large positive value that, when represented in 32 bit binary, evaluates to a negative number. The problem exists in the http_cgi_write function under http-cgi.c; however, exploitation might show svz_envblock_add in libserveez/passthrough.c as the location of the heap-based buffer over-read.

GNU Serveez versiones hasta 0.2.2, tiene un Filtrado de Información. Un atacante puede enviar una petición POST de HTTP en el URI /cgi-bin/reader. El atacante necesita incluir un encabezado Content-length con un valor positivo grande que, cuando se representa en un binario de 32 bits, se evalúa como un número negativo. El problema existe en la función http_cgi_write en el archivo http-cgi.c; sin embargo, la explotación puede mostrar la función svz_envblock_add en el archivo libserveez/passthrough.c como la ubicación de una lectura excesiva del búfer en la región heap de la memoria.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-09-09 CVE Reserved
  • 2019-11-20 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • 2024-08-06 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-681: Incorrect Conversion between Numeric Types
CAPEC
References (1)
URL Tag Source
URL Date SRC
https://github.com/agadient/SERVEEZ-CVE 2024-08-05
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gnu
Search vendor "Gnu"
Serveez
Search vendor "Gnu" for product "Serveez"
<= 0.2.2
Search vendor "Gnu" for product "Serveez" and version " <= 0.2.2"
-
Affected