Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on April 23rd, 2019 📆 | 2995 Views ⚑

0

Mercurial up to 4.8 Subrepository Symlink privilege escalation


https://www.ispeech.org/text.to.speech

CVSS Meta Temp Score Current Exploit Price (≈)
5.3 $0-$5k

A vulnerability, which was classified as critical, was found in Mercurial up to 4.8. Affected is a function of the component Subrepository Handler. The manipulation with an unknown input leads to a privilege escalation vulnerability (Symlink). CWE is classifying the issue as CWE-269. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was presented 04/22/2019 as bug report (Bugzilla). The advisory is shared for download at bugzilla.redhat.com. This vulnerability is traded as CVE-2019-3902 since 01/03/2019. There are neither technical details nor an exploit publicly available.

Upgrading to version 4.9 eliminates this vulnerability.

Name

VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: ?
VulDB Reliability: ?

VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Privilege escalation / Symlink (CWE-269)
Local: Yes
Remote: No

Availability: ?
Status: Not defined

Price Prediction: ?
Current Price Estimation: ?


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: Upgrade
Status: ?
0-Day Time: ?

Upgrade: Mercurial 4.9

01/03/2019 CVE assigned
04/22/2019 +109 days Advisory disclosed
04/23/2019 +1 days VulDB entry created
04/23/2019 +0 days VulDB last updateAdvisory: bugzilla.redhat.com

CVE: CVE-2019-3902 (?)

Created: 04/23/2019 09:06 AM
Complete: ?

Enable the mail alert feature now!

https://vuldb.com/?id.133968

Tagged with:



Comments are closed.