CVE-2019-5600
high-risk
Published 2019-07-03
In FreeBSD 12.0-STABLE before r349622, 12.0-RELEASE before 12.0-RELEASE-p7, 11.3-PRERELEASE before r349624, 11.3-RC3 before 11.3-RC3-p1, and 11.2-RELEASE before 11.2-RELEASE-p11, a bug in iconv implementation may allow an attacker to write past the end of an output buffer. Depending on the implementation, an attacker may be able to create a denial of service, provoke incorrect program behavior, or induce a remote code execution.
Do I need to act?
~
2.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (18)
Affected Vendors
References (4)
Third Party Advisory
http://packetstormsecurity.com/files/153520/FreeBSD-Security-Advisory-FreeBSD-SA...
Third Party Advisory
http://packetstormsecurity.com/files/153520/FreeBSD-Security-Advisory-FreeBSD-SA...
56
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
5/34 · Minimal
Exposure
19/34 · Moderate