|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for gupnp (DLA-2315-1)|
|Summary:||The remote host is missing an update for the 'gupnp'; package(s) announced via the DLA-2315-1 advisory.|
The remote host is missing an update for the 'gupnp'
package(s) announced via the DLA-2315-1 advisory.
Yunus Cadirci found an issue in the SUBSCRIBE method of UPnP, a
network protocol for devices to automatically discover and communicate
with each other. Insuficient checks on this method allowed attackers
to use vulnerable UPnP services for DoS attacks or possibly to bypass
'gupnp' package(s) on Debian Linux.
For Debian 9 stretch, this problem has been fixed in version
We recommend that you upgrade your gupnp packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-12695|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.