CVE-2019-5819

Insufficient data validation in developer tools in Google Chrome on OS X prior to 74.0.3729.108 allowed a local attacker to execute arbitrary code via a crafted string copied to clipboard.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:12

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/', 'name': 'FEDORA-2019-a1af621faf', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/', 'name': 'FEDORA-2019-8fb8240d14', 'tags': ['Mailing List', 'Patch', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/ -
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/19 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Aug/19 -
References (DEBIAN) https://www.debian.org/security/2019/dsa-4500 - Third Party Advisory () https://www.debian.org/security/2019/dsa-4500 -
References (GENTOO) https://security.gentoo.org/glsa/201908-18 - Third Party Advisory () https://security.gentoo.org/glsa/201908-18 -
References (MISC) https://crbug.com/919356 - Exploit, Issue Tracking, Vendor Advisory () https://crbug.com/919356 -
References (MISC) https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html - Vendor Advisory () https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html - Mailing List, Patch, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html -

11 Apr 2022, 20:42

Type Values Removed Values Added
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/19 - (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/19 - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/ - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/201908-18 - (GENTOO) https://security.gentoo.org/glsa/201908-18 - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2019/dsa-4500 - (DEBIAN) https://www.debian.org/security/2019/dsa-4500 - Third Party Advisory
First Time Debian
Debian debian Linux
CVSS v2 : 4.4
v3 : 7.3
v2 : 4.4
v3 : 7.8
CPE cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

08 Sep 2021, 17:22

Type Values Removed Values Added
CPE cpe:2.3:o:apple:mac_os:-:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
CWE CWE-78

Information

Published : 2019-06-27 17:15

Updated : 2023-12-10 12:59


NVD link : CVE-2019-5819

Mitre link : CVE-2019-5819

CVE.ORG link : CVE-2019-5819


JSON object : View

Products Affected

opensuse

  • backports
  • leap

debian

  • debian_linux

google

  • chrome

apple

  • macos

fedoraproject

  • fedora
CWE
CWE-20

Improper Input Validation

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')