ID CVE-2018-19200
Summary An issue was discovered in uriparser before 0.9.0. UriCommon.c allows attempted operations on NULL input via a uriResetUri* function.
References
Vulnerable Configurations
  • cpe:2.3:a:uriparser_project:uriparser:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.7.8:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.7.9:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.7.9:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.8.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.8.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:uriparser_project:uriparser:0.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:uriparser_project:uriparser:0.8.6:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:-:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:-:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:0.93:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:0.93:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:1.1:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:1.2:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:1.2:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.0.34:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.0.34:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.1.8.8.p3-1.1:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.1.8.8.p3-1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:2.3:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:3.0.18:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:3.0.18:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:3.0.23:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:3.0.23:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:3.2.4:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:3.2.4:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:5.0.9:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:5.0.9:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:6.0.14:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:6.0.14:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:6.2:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:6.2:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 12-12-2018 - 14:16)
Impact:
Exploitability:
CWE CWE-476
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
misc
mlist [debian-lts-announce] 20181120 [SECURITY] [DLA 1581-1] uriparser security update
Last major update 12-12-2018 - 14:16
Published 12-11-2018 - 15:29
Last modified 12-12-2018 - 14:16
Back to Top