Vulnerability in iconv library
| Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
|---|---|---|---|---|
| STORM-2019-011 | CVE-2019-5600 | 08/08/2019 | medium | v3 |
Vulnerability details
A buffer overflow in the iconv library can lead to a denial of service or remote code execution.
Impacted products
| Products | Severity | Detail |
|---|---|---|
| Stormshield Network Security | medium | A buffer overflow in the libiconv can lead to a denial of service or remote code execution. |
Revisions
| Version | Date | Description |
|---|---|---|
| v1 | 08/08/2019 | Initial release |
| v2 | 10/07/2019 | Add SNS 2.x fix versions |
| v3 | 10/08/2019 | Fix SNS 3.x fix versions |

Stormshield Network Security |
CVSS v2 Overall Score: 4.3
|
Analysis |
Impacted version |
|
Multiple SNS services use a vulnerable version of libiconv. An attacker can potentially crash those services or take their control. |
|
Workaround solution |
Solution |
|
There is no workaround solution. |
The SNS 2.7.5, 2.15.0, 3.7.8 and 3.9.2 updates will fix this vulnerability. |
| Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
|---|---|---|---|---|---|
| Adjacent Network | Low | None | Partial | Partial | Partial |
| CVSS Base score: 5.8 | CVSS Vector: (AV:A/AC:L/Au:N/C:P/I:P/A:P) |
| Exploitability | Remediation Level | Report Confidence |
|---|---|---|
| Unproven that exploit exists | Official fix | Confirmed |
| CVSS Temporal score: 4.3 | CVSS Vector: (AV:A/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C) |
| Collateral Damage Potential | Target Distribution |
|---|---|
| None | High [76-100%] |
| CVSS Environmental score: 4.3 | CVSS Vector: (AV:A/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND) |

