Unrated severityNVD Advisory· Published Mar 6, 2020· Updated Aug 5, 2024
CVE-2019-20503
CVE-2019-20503
Description
usrsctp before 2019-12-20 has out-of-bounds reads in sctp_load_addresses_from_init.
Affected products
26- usrsctp/usrsctpdescription
- osv-coords25 versionspkg:rpm/opensuse/chromium&distro=openSUSE%20Leap%2015.1pkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2012%20SP3pkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2015%20SP1pkg:rpm/suse/MozillaFirefox&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Enterprise%20Storage%205pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP1pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/MozillaFirefox&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/MozillaFirefox&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/MozillaFirefox&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP1
< 80.0.3987.149-41.1+ 24 more
- (no CPE)range: < 80.0.3987.149-41.1
- (no CPE)range: < 80.0.3987.149-41.1
- (no CPE)range: < 80.0.3987.149-bp151.3.63.3
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-3.75.1
- (no CPE)range: < 68.6.0-78.64.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-109.110.1
- (no CPE)range: < 68.6.0-3.74.1
Patches
21 file changed · +1 −1
configure.ac+1 −1 modified@@ -28,7 +28,7 @@ dnl OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF dnl SUCH DAMAGE. dnl -AC_INIT([libusrsctp], [0.9.3.0]) +AC_INIT([libusrsctp], [0.9.4.0]) AM_INIT_AUTOMAKE([foreign]) AC_PROG_CC
790a7a2555aeImprove input validation for some parameters having a too small
2 files changed · +8 −4
usrsctplib/netinet/sctp_auth.c+3 −2 modified@@ -34,7 +34,7 @@ #ifdef __FreeBSD__ #include <sys/cdefs.h> -__FBSDID("$FreeBSD: head/sys/netinet/sctp_auth.c 352438 2019-09-17 09:46:42Z tuexen $"); +__FBSDID("$FreeBSD: head/sys/netinet/sctp_auth.c 355931 2019-12-20 15:25:08Z tuexen $"); #endif #include <netinet/sctp_os.h> @@ -1421,7 +1421,8 @@ sctp_auth_get_cookie_params(struct sctp_tcb *stcb, struct mbuf *m, ptype = ntohs(phdr->param_type); plen = ntohs(phdr->param_length); - if ((plen == 0) || (offset + plen > length)) + if ((plen < sizeof(struct sctp_paramhdr)) || + (offset + plen > length)) break; if (ptype == SCTP_RANDOM) {
usrsctplib/netinet/sctp_pcb.c+5 −2 modified@@ -34,7 +34,7 @@ #ifdef __FreeBSD__ #include <sys/cdefs.h> -__FBSDID("$FreeBSD: head/sys/netinet/sctp_pcb.c 353477 2019-10-13 16:14:04Z markj $"); +__FBSDID("$FreeBSD: head/sys/netinet/sctp_pcb.c 355931 2019-12-20 15:25:08Z tuexen $"); #endif #include <netinet/sctp_os.h> @@ -7247,7 +7247,7 @@ sctp_load_addresses_from_init(struct sctp_tcb *stcb, struct mbuf *m, if (offset + plen > limit) { break; } - if (plen == 0) { + if (plen < sizeof(struct sctp_paramhdr)) { break; } #ifdef INET @@ -7463,6 +7463,9 @@ sctp_load_addresses_from_init(struct sctp_tcb *stcb, struct mbuf *m, if (plen > sizeof(lstore)) { return (-23); } + if (plen < sizeof(struct sctp_asconf_addrv4_param)) { + return (-101); + } phdr = sctp_get_next_param(m, offset, (struct sctp_paramhdr *)&lstore, plen);
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
38- lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.htmlmitrevendor-advisory
- lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.htmlmitrevendor-advisory
- lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.htmlmitrevendor-advisory
- lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.htmlmitrevendor-advisory
- access.redhat.com/errata/RHSA-2020:0815mitrevendor-advisory
- access.redhat.com/errata/RHSA-2020:0816mitrevendor-advisory
- access.redhat.com/errata/RHSA-2020:0819mitrevendor-advisory
- access.redhat.com/errata/RHSA-2020:0820mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DDNOAGIX5D77TTHT6YPMVJ5WTXTCQEI/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWANFIR3PYAL5RJQ4AO3ZS2DYMSF2ZGZ/mitrevendor-advisory
- security.gentoo.org/glsa/202003-02mitrevendor-advisory
- security.gentoo.org/glsa/202003-10mitrevendor-advisory
- usn.ubuntu.com/4299-1/mitrevendor-advisory
- usn.ubuntu.com/4328-1/mitrevendor-advisory
- usn.ubuntu.com/4335-1/mitrevendor-advisory
- www.debian.org/security/2020/dsa-4639mitrevendor-advisory
- www.debian.org/security/2020/dsa-4642mitrevendor-advisory
- www.debian.org/security/2020/dsa-4645mitrevendor-advisory
- seclists.org/fulldisclosure/2020/May/49mitremailing-list
- seclists.org/fulldisclosure/2020/May/52mitremailing-list
- seclists.org/fulldisclosure/2020/May/55mitremailing-list
- seclists.org/fulldisclosure/2020/May/59mitremailing-list
- lists.debian.org/debian-lts-announce/2020/03/msg00013.htmlmitremailing-list
- lists.debian.org/debian-lts-announce/2020/03/msg00023.htmlmitremailing-list
- lists.debian.org/debian-lts-announce/2023/07/msg00003.htmlmitremailing-list
- bugs.chromium.org/p/project-zero/issues/detailmitre
- chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.htmlmitre
- crbug.com/1059349mitre
- github.com/sctplab/usrsctp/commit/790a7a2555aefb392a5a69923f1e9d17b4968467mitre
- support.apple.com/HT211168mitre
- support.apple.com/HT211171mitre
- support.apple.com/HT211175mitre
- support.apple.com/HT211177mitre
- support.apple.com/kb/HT211168mitre
- support.apple.com/kb/HT211171mitre
- support.apple.com/kb/HT211175mitre
- support.apple.com/kb/HT211177mitre
News mentions
0No linked articles in our index yet.