CVE-2019-11068
Published: 10 April 2019
libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
Priority
Status
Package | Release | Status |
---|---|---|
libxslt Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
trusty |
Released
(1.1.28-2ubuntu0.2)
|
|
xenial |
Released
(1.1.28-2.1ubuntu0.2)
|
|
bionic |
Released
(1.1.29-5ubuntu0.1)
|
|
cosmic |
Released
(1.1.32-2ubuntu0.1)
|
|
Patches: upstream: https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |