U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-0201

Change History

Modified Analysis by NIST 4/19/2022 11:35:49 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:* versions up to (excluding) 19.1.0.0.1
     *cpe:2.3:a:oracle:siebel_core_-_server_framework:*:*:*:*:*:*:*:* versions up to (including) 21.5
     *cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:* versions up to (excluding) 18.1.3.1.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:redhat:fuse:1.0.0:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:* versions from (including) 1.0.0 up to (including) 3.4.13
     *cpe:2.3:a:apache:zookeeper:3.5.0:-:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.0:alpha:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.0:rc0:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:-:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:alpha:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:rc0:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:rc2:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:rc3:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:rc4:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.2:-:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.2:alpha:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.2:rc0:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.2:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.3:-:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.3:beta:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.3:rc0:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.3:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.4:beta:*:*:*:*:*:*
OR
     *cpe:2.3:a:apache:activemq:5.15.9:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:drill:1.16.0:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:* versions from (including) 1.0.0 up to (including) 3.4.13
     *cpe:2.3:a:apache:zookeeper:3.5.0:-:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.0:alpha:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.0:rc0:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:-:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:alpha:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:rc0:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:rc2:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:rc3:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.1:rc4:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.2:-:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.2:alpha:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.2:rc0:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.2:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.3:-:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.3:beta:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.3:rc0:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.3:rc1:*:*:*:*:*:*
     *cpe:2.3:a:apache:zookeeper:3.5.4:beta:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Removed CVSS V3
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:3140 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:3140 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:3892 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:3892 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:4352 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:4352 Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E Mailing List, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E Mailing List, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/5d9a1cf41a5880557bf680b7321b4ab9a4d206c601ffb15fef6f196a@%3Ccommits.accumulo.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/5d9a1cf41a5880557bf680b7321b4ab9a4d206c601ffb15fef6f196a@%3Ccommits.accumulo.apache.org%3E Mailing List, Patch, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E Mailing List, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/f6112882e30a31992a79e0a8c31ac179e9d0de7c708de3a9258d4391@%3Cissues.bookkeeper.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/f6112882e30a31992a79e0a8c31ac179e9d0de7c708de3a9258d4391@%3Cissues.bookkeeper.apache.org%3E Mailing List, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E Mailing List, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/r40f32125c1d97ad82404cc918171d9e0fcf78e534256674e9da1eb4b@%3Ccommon-issues.hadoop.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r40f32125c1d97ad82404cc918171d9e0fcf78e534256674e9da1eb4b@%3Ccommon-issues.hadoop.apache.org%3E Mailing List, Vendor Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2019/05/msg00033.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/05/msg00033.html Mailing List, Third Party Advisory
Changed Reference Type
https://seclists.org/bugtraq/2019/Jun/13 No Types Assigned
https://seclists.org/bugtraq/2019/Jun/13 Mailing List, Third Party Advisory
Changed Reference Type
https://security.netapp.com/advisory/ntap-20190619-0001/ No Types Assigned
https://security.netapp.com/advisory/ntap-20190619-0001/ Third Party Advisory
Changed Reference Type
https://www.debian.org/security/2019/dsa-4461 No Types Assigned
https://www.debian.org/security/2019/dsa-4461 Third Party Advisory
Changed Reference Type
https://www.oracle.com//security-alerts/cpujul2021.html No Types Assigned
https://www.oracle.com//security-alerts/cpujul2021.html Patch, Third Party Advisory
Changed Reference Type
https://www.oracle.com/security-alerts/cpujul2020.html No Types Assigned
https://www.oracle.com/security-alerts/cpujul2020.html Patch, Third Party Advisory
Changed Reference Type
https://www.oracle.com/security-alerts/cpuoct2020.html No Types Assigned
https://www.oracle.com/security-alerts/cpuoct2020.html Patch, Third Party Advisory