CVE-2019-16779

In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.
Configurations

Configuration 1 (hide)

cpe:2.3:a:excon_project:excon:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-12-16 20:15

Updated : 2024-02-28 17:28


NVD link : CVE-2019-16779

Mitre link : CVE-2019-16779

CVE.ORG link : CVE-2019-16779


JSON object : View

Products Affected

opensuse

  • backports_sle
  • leap

excon_project

  • excon

debian

  • debian_linux
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-664

Improper Control of a Resource Through its Lifetime