{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"WebKitGTK and WPE WebKit prior to version 2.24.1 failed to properly apply configured HTTP proxy settings when downloading livestream video (HLS, DASH, or Smooth Streaming), an error resulting in deanonymization. This issue was corrected by changing the way livestreams are downloaded."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-09-06T17:06:11.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"https://bugs.webkit.org/show_bug.cgi?id=193718"},{"tags":["x_refsource_MISC"],"url":"https://trac.webkit.org/changeset/243197/webkit"},{"name":"20190411 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"https://seclists.org/bugtraq/2019/Apr/21"},{"name":"[oss-security] 20190410 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2019/04/11/1"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html"},{"name":"FEDORA-2019-d9a15be3ba","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/"},{"name":"USN-3948-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3948-1/"},{"name":"openSUSE-SU-2019:1374","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html"},{"name":"openSUSE-SU-2019:1391","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html"},{"name":"GLSA-201909-05","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"https://security.gentoo.org/glsa/201909-05"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2019-11070","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"WebKitGTK and WPE WebKit prior to version 2.24.1 failed to properly apply configured HTTP proxy settings when downloading livestream video (HLS, DASH, or Smooth Streaming), an error resulting in deanonymization. This issue was corrected by changing the way livestreams are downloaded."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://bugs.webkit.org/show_bug.cgi?id=193718","refsource":"MISC","url":"https://bugs.webkit.org/show_bug.cgi?id=193718"},{"name":"https://trac.webkit.org/changeset/243197/webkit","refsource":"MISC","url":"https://trac.webkit.org/changeset/243197/webkit"},{"name":"20190411 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002","refsource":"BUGTRAQ","url":"https://seclists.org/bugtraq/2019/Apr/21"},{"name":"[oss-security] 20190410 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2019/04/11/1"},{"name":"http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html"},{"name":"FEDORA-2019-d9a15be3ba","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/"},{"name":"USN-3948-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3948-1/"},{"name":"openSUSE-SU-2019:1374","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html"},{"name":"openSUSE-SU-2019:1391","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html"},{"name":"GLSA-201909-05","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201909-05"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T22:40:16.199Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugs.webkit.org/show_bug.cgi?id=193718"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://trac.webkit.org/changeset/243197/webkit"},{"name":"20190411 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"https://seclists.org/bugtraq/2019/Apr/21"},{"name":"[oss-security] 20190410 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2019/04/11/1"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html"},{"name":"FEDORA-2019-d9a15be3ba","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/"},{"name":"USN-3948-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3948-1/"},{"name":"openSUSE-SU-2019:1374","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html"},{"name":"openSUSE-SU-2019:1391","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html"},{"name":"GLSA-201909-05","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"https://security.gentoo.org/glsa/201909-05"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2019-11070","datePublished":"2019-04-10T20:15:06.000Z","dateReserved":"2019-04-10T00:00:00.000Z","dateUpdated":"2024-08-04T22:40:16.199Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}