CVE-2019-16395

GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() function in cobc/tree.c via crafted COBOL source code.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 44%
VendorProductVersion
gnucobol_projectgnucobol
2.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gnucobol
sid
5
fixed
trixie
5
fixed
bookworm
5
fixed
buster
ignored
stretch
ignored
jessie
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gnucobol
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
needs-triage
eoan
ignored
disco
ignored
bionic
dne
xenial
dne
trusty
dne
open-cobol
noble
dne
mantic
dne
lunar
dne
kinetic
dne
jammy
dne
impish
dne
hirsute
dne
groovy
dne
focal
dne
eoan
dne
disco
dne
bionic
needs-triage
xenial
needs-triage
trusty
dne