Executive Summary

Informations
Name CVE-2019-10063 First vendor Publication 2019-03-26
Vendor Cve Last vendor Modification 2019-05-13

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Overall CVSS Score 9
Base Score 9 Environmental Score 9
impact SubScore 6 Temporal Score 9
Exploitabality Sub Score 2.2
 
Attack Vector Network Attack Complexity High
Privileges Required None User Interaction None
Scope Changed Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Flatpak before 1.0.8, 1.1.x and 1.2.x before 1.2.4, and 1.3.x before 1.3.1 allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could otherwise be used to inject commands into the controlling terminal so that they would be executed outside the sandbox after the sandboxed app exits. This fix was incomplete: on 64-bit platforms, the seccomp filter could be bypassed by an ioctl request number that has TIOCSTI in its 32 least significant bits and an arbitrary nonzero value in its 32 most significant bits, which the Linux kernel would treat as equivalent to TIOCSTI.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10063

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

Sources (Detail)

Source Url
MISC https://github.com/flatpak/flatpak/issues/2782
REDHAT https://access.redhat.com/errata/RHSA-2019:1024
https://access.redhat.com/errata/RHSA-2019:1143

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2021-05-04 13:21:32
  • Multiple Updates
2021-04-22 02:36:23
  • Multiple Updates
2020-05-23 02:20:50
  • Multiple Updates
2019-06-07 12:10:03
  • Multiple Updates
2019-05-13 17:19:04
  • Multiple Updates
2019-05-08 05:18:18
  • Multiple Updates
2019-04-25 17:19:08
  • Multiple Updates
2019-03-28 00:19:05
  • Multiple Updates
2019-03-26 21:19:30
  • First insertion