{"containers":{"cna":{"affected":[{"product":"libslirp","vendor":"slirp","versions":[{"lessThanOrEqual":"4.2.0","status":"affected","version":"unspecified","versionType":"custom"}]}],"credits":[{"lang":"en","value":"This issue was discovered by Aviv Sasson of Palo Alto Networks."}],"datePublic":"2020-04-20T00:00:00.000Z","descriptions":[{"lang":"en","value":"A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service."}],"exploits":[{"lang":"en","value":"A public proof of concept is available."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-416","description":"CWE-416 Use After Free","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-07-26T13:06:09.000Z","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"references":[{"tags":["x_refsource_MISC"],"url":"https://gitlab.freedesktop.org/slirp/libslirp/-/issues/20"},{"tags":["x_refsource_MISC"],"url":"https://gitlab.freedesktop.org/slirp/libslirp/-/commit/9ac0371bb8c0a40f5d9f82a1c25129660e81df04"},{"name":"DSA-4665","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"https://www.debian.org/security/2020/dsa-4665"},{"name":"FEDORA-2020-30c45be10c","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWFD4MWV3YWIHVHSA2F7FKOLJFL4PHOX/"},{"name":"FEDORA-2020-1608d52724","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NKT2MTSINE4NUPG5L6BYH6N23NBNITOL/"},{"name":"openSUSE-SU-2020:0636","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00022.html"},{"name":"USN-4372-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/4372-1/"},{"name":"openSUSE-SU-2020:0756","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00001.html"},{"name":"[debian-lts-announce] 20200629 [SECURITY] [DLA 2262-1] qemu security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html"},{"name":"[debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html"}],"source":{"defect":["20"],"discovery":"EXTERNAL"},"title":"libslirp: use after free vulnerability cause a denial of service.","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@paloaltonetworks.com","DATE_PUBLIC":"2020-04-20T20:28:00.000Z","ID":"CVE-2020-1983","STATE":"PUBLIC","TITLE":"libslirp: use after free vulnerability cause a denial of service."},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"libslirp","version":{"version_data":[{"version_affected":"<=","version_value":"4.2.0"}]}}]},"vendor_name":"slirp"}]}},"credit":[{"lang":"eng","value":"This issue was discovered by Aviv Sasson of Palo Alto Networks."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service."}]},"exploit":[{"lang":"en","value":"A public proof of concept is available."}],"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-416 Use After Free"}]}]},"references":{"reference_data":[{"name":"https://gitlab.freedesktop.org/slirp/libslirp/-/issues/20","refsource":"MISC","url":"https://gitlab.freedesktop.org/slirp/libslirp/-/issues/20"},{"name":"https://gitlab.freedesktop.org/slirp/libslirp/-/commit/9ac0371bb8c0a40f5d9f82a1c25129660e81df04","refsource":"MISC","url":"https://gitlab.freedesktop.org/slirp/libslirp/-/commit/9ac0371bb8c0a40f5d9f82a1c25129660e81df04"},{"name":"DSA-4665","refsource":"DEBIAN","url":"https://www.debian.org/security/2020/dsa-4665"},{"name":"FEDORA-2020-30c45be10c","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWFD4MWV3YWIHVHSA2F7FKOLJFL4PHOX/"},{"name":"FEDORA-2020-1608d52724","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKT2MTSINE4NUPG5L6BYH6N23NBNITOL/"},{"name":"openSUSE-SU-2020:0636","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00022.html"},{"name":"USN-4372-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/4372-1/"},{"name":"openSUSE-SU-2020:0756","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00001.html"},{"name":"[debian-lts-announce] 20200629 [SECURITY] [DLA 2262-1] qemu security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html"},{"name":"[debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html"}]},"source":{"defect":["20"],"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T06:54:00.401Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://gitlab.freedesktop.org/slirp/libslirp/-/issues/20"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://gitlab.freedesktop.org/slirp/libslirp/-/commit/9ac0371bb8c0a40f5d9f82a1c25129660e81df04"},{"name":"DSA-4665","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"https://www.debian.org/security/2020/dsa-4665"},{"name":"FEDORA-2020-30c45be10c","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWFD4MWV3YWIHVHSA2F7FKOLJFL4PHOX/"},{"name":"FEDORA-2020-1608d52724","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NKT2MTSINE4NUPG5L6BYH6N23NBNITOL/"},{"name":"openSUSE-SU-2020:0636","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00022.html"},{"name":"USN-4372-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/4372-1/"},{"name":"openSUSE-SU-2020:0756","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00001.html"},{"name":"[debian-lts-announce] 20200629 [SECURITY] [DLA 2262-1] qemu security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00032.html"},{"name":"[debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html"}]}]},"cveMetadata":{"assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","cveId":"CVE-2020-1983","datePublished":"2020-04-22T19:30:14.844Z","dateReserved":"2019-12-04T00:00:00.000Z","dateUpdated":"2024-09-16T19:41:29.761Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}