{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T12:08:31.574","vulnerabilities":[{"cve":{"id":"CVE-2019-6474","sourceIdentifier":"security-officer@isc.org","published":"2019-10-16T18:15:37.217","lastModified":"2024-11-21T04:46:31.230","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A missing check on incoming client requests can be exploited to cause a situation where the Kea server's lease storage contains leases which are rejected as invalid when the server tries to load leases from storage on restart. If the number of such leases exceeds a hard-coded limit in the Kea code, a server trying to restart will conclude that there is a problem with its lease store and give up. Versions affected: 1.4.0 to 1.5.0, 1.6.0-beta1, and 1.6.0-beta2"},{"lang":"es","value":"Una falta de comprobación en las peticiones de clientes entrantes puede ser explotadas para causar una situación en la que el almacenamiento arrendado del servidor Kea contiene arrendamientos que son rechazados como no válidos cuando el servidor intenta cargar arrendamientos del almacenamiento al reiniciar. Si el número de tales arrendamientos excede un límite codificado en el código Kea, un servidor que intente reiniciar concluirá que existe un problema con su almacén de arrendamientos y se dará por vencido. Versiones afectadas: 1.4.0 hasta 1.5.0, 1.6.0-beta1 y 1.6.0-beta2"}],"metrics":{"cvssMetricV31":[{"source":"security-officer@isc.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:N/I:N/A:C","baseScore":6.1,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":6.5,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-772"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:kea:*:*:*:*:*:*:*:*","versionStartIncluding":"1.4.0","versionEndIncluding":"1.5.0","matchCriteriaId":"27BBC7E1-37AF-4BC6-BA53-09CF7B8921BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:kea:1.6.0:beta1:*:*:*:*:*:*","matchCriteriaId":"43793833-7D0F-4C7C-80B4-F8563AD23607"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:kea:1.6.0:beta2:*:*:*:*:*:*","matchCriteriaId":"AECDE26A-DDFD-4035-A08E-E7A5CA37F1E8"}]}]}],"references":[{"url":"https://kb.isc.org/docs/cve-2019-6474","source":"security-officer@isc.org","tags":["Vendor Advisory"]},{"url":"https://kb.isc.org/docs/cve-2019-6474","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}