| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2019-7165
Vulnerability Database
CVE-2019-7165
Base Score
CRITICAL
9.8
CVE-2019-7165
A buffer overflow in DOSBox 0.74-2 allows attackers to execute arbitrary code.
Vector
NETWORK
Published By
cve@mitre.org
Published Date
Jul 03, 2019, 18:15
Weakness Type (CWE)
:
CWE-119
CVSS Metrics
CVSS v3.0
CVSS v2
Base Score
9.8
Vector String
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Severity
CRITICAL
Version
3.0
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH
References
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00053.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYV27Z3QZTDHUZJLW3LDJYO7HBVIMJ5F/
https://seclists.org/bugtraq/2019/Jul/14
https://security-tracker.debian.org/tracker/CVE-2019-7165
https://www.debian.org/security/2019/dsa-4478
https://www.dosbox.com
Base Score
CRITICAL
9.8
Weakness Type (CWE)
:
CWE-119
CVSS Metrics
CVSS v3.0
CVSS v2
Base Score
9.8
Vector String
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Severity
CRITICAL
Version
3.0
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH