CVE-2019-13104
moderate-risk
Published 2019-08-06
In Das U-Boot versions 2016.11-rc1 through 2019.07-rc4, an underflow can cause memcpy() to overwrite a very large amount of data (including the whole stack) while reading a crafted ext4 filesystem.
Do I need to act?
-
0.29% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
References (10)
Third Party Advisory
https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75
Third Party Advisory
https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75
39
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
1/34 · Minimal
Exposure
14/34 · Moderate