{"containers":{"cna":{"affected":[{"product":"Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8)","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Microsoft Visual Studio 2017","vendor":"Microsoft","versions":[{"status":"affected","version":"15.0"}]},{"product":"Microsoft Visual Studio 2019","vendor":"Microsoft","versions":[{"status":"affected","version":"16.0"}]}],"descriptions":[{"lang":"en","value":"A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1354, CVE-2019-1387."}],"problemTypes":[{"descriptions":[{"description":"Remote Code Execution","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-05-01T23:06:06.000Z","orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1352"},{"tags":["x_refsource_MISC"],"url":"https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/"},{"name":"openSUSE-SU-2020:0123","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html"},{"name":"RHSA-2020:0228","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2020:0228"},{"name":"GLSA-202003-30","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"https://security.gentoo.org/glsa/202003-30"},{"name":"openSUSE-SU-2020:0598","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@microsoft.com","ID":"CVE-2019-1352","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)","version":{"version_data":[{"version_value":""}]}},{"product_name":"Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8)","version":{"version_data":[{"version_value":""}]}},{"product_name":"Microsoft Visual Studio 2017","version":{"version_data":[{"version_value":"15.0"}]}},{"product_name":"Microsoft Visual Studio 2019","version":{"version_data":[{"version_value":"16.0"}]}}]},"vendor_name":"Microsoft"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1354, CVE-2019-1387."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Remote Code Execution"}]}]},"references":{"reference_data":[{"name":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1352","refsource":"MISC","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1352"},{"name":"https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/","refsource":"MISC","url":"https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/"},{"name":"openSUSE-SU-2020:0123","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html"},{"name":"RHSA-2020:0228","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2020:0228"},{"name":"GLSA-202003-30","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/202003-30"},{"name":"openSUSE-SU-2020:0598","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T18:13:30.495Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1352"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/"},{"name":"openSUSE-SU-2020:0123","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html"},{"name":"RHSA-2020:0228","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2020:0228"},{"name":"GLSA-202003-30","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"https://security.gentoo.org/glsa/202003-30"},{"name":"openSUSE-SU-2020:0598","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html"}]}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2019-1352","datePublished":"2020-01-24T20:50:26.000Z","dateReserved":"2018-11-26T00:00:00.000Z","dateUpdated":"2024-08-04T18:13:30.495Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}