Vulnerability   
Search   
    Search 191973 CVE descriptions
and 86218 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.702615
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 2615-1 (libupnp4 - several vulnerabilities)
Summary:Multiple stack-based buffer overflows were discovered in libupnp4, a library;used for handling the Universal Plug and Play protocol. HD Moore from Rapid7;discovered that SSDP queries where not correctly handled by the;unique_service_name() function.;;An attacker sending carefully crafted SSDP queries to a daemon built on;libupnp4 could generate a buffer overflow, overwriting the stack, leading to;the daemon crash and possible remote code execution.
Description:Summary:
Multiple stack-based buffer overflows were discovered in libupnp4, a library
used for handling the Universal Plug and Play protocol. HD Moore from Rapid7
discovered that SSDP queries where not correctly handled by the
unique_service_name() function.

An attacker sending carefully crafted SSDP queries to a daemon built on
libupnp4 could generate a buffer overflow, overwriting the stack, leading to
the daemon crash and possible remote code execution.

Affected Software/OS:
libupnp4 on Debian Linux

Solution:
For the stable distribution (squeeze), these problems have been fixed in
version 1.8.0~
svn20100507-1+squeeze1.

For the testing distribution (wheezy), these problems have been fixed in
version 1.8.0~
svn20100507-1.2.

For the unstable distribution (sid), these problems have been fixed in
version 1.8.0~
svn20100507-1.2.

We recommend that you upgrade your libupnp4 packages.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-5964
BugTraq ID: 57602
http://www.securityfocus.com/bid/57602
CERT/CC vulnerability note: VU#922681
http://www.kb.cert.org/vuls/id/922681
Cisco Security Advisory: 20130129 Portable SDK for UPnP Devices Contains Buffer Overflow Vulnerabilities
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp
Debian Security Information: DSA-2614 (Google Search)
http://www.debian.org/security/2013/dsa-2614
Debian Security Information: DSA-2615 (Google Search)
http://www.debian.org/security/2013/dsa-2615
http://www.mandriva.com/security/advisories?name=MDVSA-2013:098
https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play
https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf
https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb
Common Vulnerability Exposure (CVE) ID: CVE-2012-5962
Common Vulnerability Exposure (CVE) ID: CVE-2012-5961
Common Vulnerability Exposure (CVE) ID: CVE-2012-5959
https://www.tenable.com/security/research/tra-2017-10
SuSE Security Announcement: openSUSE-SU-2013:0255 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-02/msg00013.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-5965
Common Vulnerability Exposure (CVE) ID: CVE-2012-5963
Common Vulnerability Exposure (CVE) ID: CVE-2012-5960
Common Vulnerability Exposure (CVE) ID: CVE-2012-5958
CopyrightCopyright (C) 2013 Greenbone Networks GmbH http://greenbone.net

This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2020 E-Soft Inc. All rights reserved.