{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T21:59:16.601","vulnerabilities":[{"cve":{"id":"CVE-2019-19334","sourceIdentifier":"secalert@redhat.com","published":"2019-12-06T16:15:10.920","lastModified":"2024-11-21T04:34:35.840","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type \"identityref\". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution."},{"lang":"es","value":"En todas las versiones de libyang anteriores a 1.0-r5, se detectó un desbordamiento del búfer en la región heap de la memoria en la manera en que libyang analiza los archivos YANG con una hoja de tipo \"identityref\". Una aplicación que usa libyang para analizar archivos YANG no confiables puede ser vulnerable a este fallo, lo que permitiría a un atacante causar una denegación de servicio o posiblemente conseguir la ejecución de código."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV30":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*","matchCriteriaId":"65E91322-5F67-43C2-8112-5ECAEC2A3C12"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*","matchCriteriaId":"80A88DE4-93F8-40C3-AA52-A5F353F028AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*","matchCriteriaId":"05C120CA-50EF-4B6D-92C9-ED736219DB07"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*","matchCriteriaId":"99D1FA55-3F56-4E09-B41E-B05C199B96B8"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*","matchCriteriaId":"35D48EC4-58D2-49C6-8049-920787733587"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*","matchCriteriaId":"B57F3953-49D6-413C-A4AE-03125935FC77"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*","matchCriteriaId":"DD62411F-A524-4E80-B540-780EA39CB6A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*","matchCriteriaId":"FEF091B1-978A-4881-B1FC-6848CD1A7BBF"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*","matchCriteriaId":"0C50D690-9A4D-4B78-BF4E-A4D9B4074216"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*","matchCriteriaId":"124A5D30-7451-4516-9AA2-963AE62DD679"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*","matchCriteriaId":"C260D13B-82E9-4596-9116-61073B42D661"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:1.0:r1:*:*:*:*:*:*","matchCriteriaId":"5F8D5FC0-959E-4014-9CB7-91378CC8B2BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:1.0:r2:*:*:*:*:*:*","matchCriteriaId":"DCBDA519-805B-4193-8092-75E2748A7BC3"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:1.0:r3:*:*:*:*:*:*","matchCriteriaId":"4653ED0D-1E48-4E56-ACA4-0475C9568A89"},{"vulnerable":true,"criteria":"cpe:2.3:a:cesnet:libyang:1.0:r4:*:*:*:*:*:*","matchCriteriaId":"F0BEE023-C83B-4465-97BC-8E15627025D1"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","matchCriteriaId":"F4CFF558-3C47-480D-A2F0-BABF26042943"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","matchCriteriaId":"80F0FA5D-8D3B-4C0E-81E2-87998286AF33"}]}]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2019:4360","source":"secalert@redhat.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19334","source":"secalert@redhat.com","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://github.com/CESNET/libyang/commit/6980afae2ff9fcd6d67508b0a3f694d75fd059d6","source":"secalert@redhat.com","tags":["Patch","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PETB6TVMFV5KUD4IKVP2JPLBCYHUGSAJ/","source":"secalert@redhat.com"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RL54JMS7XW7PI6JC4BFSNNLSX5AINQUL/","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2019:4360","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19334","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://github.com/CESNET/libyang/commit/6980afae2ff9fcd6d67508b0a3f694d75fd059d6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PETB6TVMFV5KUD4IKVP2JPLBCYHUGSAJ/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RL54JMS7XW7PI6JC4BFSNNLSX5AINQUL/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}