
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2019-20503 affects usrsctp versions before 2019-12-20, specifically in the sctp_load_addresses_from_init functionality. The vulnerability was discovered by Natalie Silvanovich of Google Project Zero and involves out-of-bounds reads (CVE Details, Project Zero).
The vulnerability is an out-of-bounds read issue in the sctp_load_addresses_from_init function of usrsctp. The issue was addressed by improving bounds checking and input validation (GitHub Commit).
If exploited, this vulnerability could lead to disclosure of process memory and potential denial of service conditions. The issue affects multiple applications that use the usrsctp library, including web browsers and communication tools (Red Hat).
The issue has been fixed in usrsctp version after 2019-12-20. Various vendors have released patches: Mozilla Firefox ESR 68.6.0, Thunderbird 68.6.0, Chrome 80.0.3987.149, and Apple products including iOS 13.5, iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, and Safari 13.1.1 (Debian Security, Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."