{"id":10582,"date":"2019-01-20T01:31:17","date_gmt":"2019-01-20T01:31:17","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/?p=10582"},"modified":"2019-01-20T01:31:17","modified_gmt":"2019-01-20T01:31:17","slug":"cve-2019-6458-%d8%a8%d8%a7%da%af-%d8%b3%d8%b1-%d8%b1%db%8c%d8%b2-%d8%ad%d8%a7%d9%81%d8%b8%d9%87-%d8%af%d8%b1-recutils","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2019-6458-%d8%a8%d8%a7%da%af-%d8%b3%d8%b1-%d8%b1%db%8c%d8%b2-%d8%ad%d8%a7%d9%81%d8%b8%d9%87-%d8%af%d8%b1-recutils\/","title":{"rendered":"CVE-2019-6458 \u0628\u0627\u06af \u0633\u0631 \u0631\u06cc\u0632 \u062d\u0627\u0641\u0638\u0647 \u062f\u0631 Recutils"},"content":{"rendered":"<p dir=\"ltr\">\n<div id=\"topcontainer\" dir=\"ltr\">\n<div id=\"topleft\"><a title=\"Go to cvedetails.com homepage\" href=\"https:\/\/www.cvedetails.com\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"CVEdetails.com the ultimate security vulnerability data source\" src=\"https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2019\/01\/cve-2019-6458.png\" alt=\"CVEdetails.com the ultimate security vulnerability data source\" border=\"0\" \/><\/a><\/div>\n<\/div>\n<p dir=\"ltr\">\n<p dir=\"ltr\">\n<table id=\"maintable\" dir=\"ltr\">\n<tbody>\n<tr>\n<td id=\"mainmenutd\" valign=\"top\"><\/td>\n<td align=\"left\" valign=\"top\">&nbsp;<\/p>\n<div id=\"contentdiv\">\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td id=\"cvedetails\" valign=\"top\">An issue was discovered in GNU Recutils 1.8. There is a memory leak in rec_buf_new in rec-buf.c when called from rec_parse_rset in rec-parser.c in librec.a.<br \/>\n<span class=\"datenote\"> Publish Date : 2019-01-16 Last Update Date : 2019-01-17 <\/span><\/p>\n<p><!-- [if IE]>\n\n\n\n<style type=\"text\/css\"> .menubarmain div { left:0; top:1.5em; } <\/style>\n\n <![endif]--><\/p>\n<h2><span id=\"pm_cvssscorestable\" class=\"pm\">&#8211;<\/span> CVSS Scores &amp; Vulnerability Types<\/h2>\n<table>\n<tbody>\n<tr>\n<td>\n<table id=\"cvssscorestable\" class=\"details\">\n<tbody>\n<tr>\n<th>CVSS Score<\/th>\n<td>4.3<\/td>\n<\/tr>\n<tr>\n<th>Confidentiality Impact<\/th>\n<td>None <span class=\"cvssdesc\">(There is no impact to the confidentiality of the system.)<\/span><\/td>\n<\/tr>\n<tr>\n<th>Integrity Impact<\/th>\n<td>None <span class=\"cvssdesc\">(There is no impact to the integrity of the system)<\/span><\/td>\n<\/tr>\n<tr>\n<th>Availability Impact<\/th>\n<td>Partial <span class=\"cvssdesc\">(There is reduced performance or interruptions in resource availability.)<\/span><\/td>\n<\/tr>\n<tr>\n<th>Access Complexity<\/th>\n<td>Medium <span class=\"cvssdesc\">(The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)<\/span><\/td>\n<\/tr>\n<tr>\n<th>Authentication<\/th>\n<td>Not required <span class=\"cvssdesc\">(Authentication is not required to exploit the vulnerability.)<\/span><\/td>\n<\/tr>\n<tr>\n<th>Gained Access<\/th>\n<td>None<\/td>\n<\/tr>\n<tr>\n<th>Vulnerability Type(s)<\/th>\n<td><\/td>\n<\/tr>\n<tr>\n<th>CWE ID<\/th>\n<td><a title=\"CWE-399 - CWE definition\" href=\"https:\/\/www.cvedetails.com\/cwe-details\/399\/cwe.html\" target=\"_blank\" rel=\"noopener\">399<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span id=\"pm_vulnprodstable\" class=\"pm\">&#8211;<\/span> Products Affected By CVE-2019-6458<\/h2>\n<h2><span id=\"pm_vulnversconuttable\" class=\"pm\">&#8211;<\/span> Number Of Affected Versions By Product<\/h2>\n<h2><span id=\"pm_vulnrefstable\" class=\"pm\">&#8211;<\/span> References For CVE-2019-6458<\/h2>\n<\/td>\n<td align=\"left\" valign=\"top\"><\/td>\n<\/tr>\n<tr>\n<td>\n<h2><span id=\"pm_metasploitmodstable\" class=\"pm\">&#8211;<\/span> Metasploit Modules Related To CVE-2019-6458<\/h2>\n<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/td>\n<td align=\"left\" valign=\"top\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"disclaimer\" dir=\"ltr\">CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is <a href=\"http:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">MITRE&#8217;s CVE web site<\/a>. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is <a href=\"http:\/\/cwe.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">MITRE&#8217;s CWE web site<\/a>. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is <a href=\"http:\/\/oval.mitre.org\" target=\"_blank\" rel=\"noopener noreferrer\">MITRE&#8217;s OVAL web site<\/a>.<\/div>\n<p dir=\"ltr\">Use of this information constitutes acceptance for use in an AS IS condition.<br \/>\nThere are NO warranties, implied or otherwise, with regard to this information or its use.<br \/>\nAny use of this information is at the user&#8217;s risk.<br \/>\nIt is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.<br \/>\nEACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site.<br \/>\nALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT,<br \/>\nINDIRECT or any other kind of loss.<\/p>\n<p dir=\"ltr\">\n\u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0648 \u0645\u0634\u0627\u0648\u0631\u0647 &#8211; \u062b\u0628\u062a \u062f\u0627\u0645\u0646\u0647<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; An issue was discovered in GNU Recutils 1.8. There is a memory leak in rec_buf_new in rec-buf.c when called from rec_parse_rset in rec-parser.c in librec.a. Publish Date : 2019-01-16 Last Update Date : 2019-01-17 &#8211; CVSS Scores &amp; Vulnerability Types CVSS Score 4.3 Confidentiality Impact None (There is no impact to the confidentiality of &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-10582","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/10582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=10582"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/10582\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=10582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=10582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=10582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}