Executive Summary

Summary
Title Portable SDK for UPnP Devices (libupnp) contains multiple buffer overflows in SSDP
Informations
Name VU#922681 First vendor Publication 2013-01-29
Vendor VU-CERT Last vendor Modification 2013-03-11
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#922681

Portable SDK for UPnP Devices (libupnp) contains multiple buffer overflows in SSDP

Original Release date: 29 Jan 2013 | Last revised: 11 Mar 2013

Overview

The Portable SDK for UPnP Devices libupnp library contains multiple buffer overflow vulnerabilities. Devices that use libupnp may also accept UPnP queries over the WAN interface, therefore exposing the vulnerabilities to the internet.

Description

Universal Plug and Play (UPnP) is a set of network protocols designed to support automatic discovery and service configuration. The Portable SDK for UPnP Devices (libupnp) is an open source project that has its roots in the Linux SDK for UPnP Devices and software from Intel (Intel Tools for UPnP Technologies and later Developer Tools for UPnP Technologies). Intel no longer maintains or supports these tools. Many different vendors produce UPnP-enabled devices that use libupnp.

As part of a large scale security research project, Rapid7 investigated internet-connected UPnP devices and found, among other security issues, multiple buffer overflow vulnerabilities in the libupnp implementation of the Simple Service Discovery Protocol (SSDP). Rapid7's report summarizes these vulnerabilities:

    Portable SDK for UPnP Devices unique_service_name() Buffer Overflows

    The libupnp library is vulnerable to multiple stack-based buffer overflows when handling malicious SSDP requests. This library is used by tens of millions of deployed network devices, of which approximately twenty million are exposed directly to the internet. In addition to network devices, many streaming media and file sharing applications are also exposed to attack through this library.

    This advisory does not address historic or current vulnerabilities in the HTTP and SOAP processing code of libupnp.

    Affected Versions
    Versions 1.2 (Intel SDK) and 1.2.1a - 1.8.0 (Portable SDK) are affected by at least three remotely exploitable buffer overflows in the unique_service_name() function, which is called to process incoming SSDP requests on UDP port 1900. Additionally, versions prior to 1.6.17 are vulnerable to additional issues in the same function. Please see Appendix A for a review of the vulnerable code by version.

    Affected Vendors
    Hundreds of vendors have used the libupnp library in their products, many of which are acting as the home routers for consumer networks. Any application linking to libupnp is likely to be affected and a list of confirmed vendors and products is provided in Appendix B.
Additional details may be found in a paper and advisory from Rapid7.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code on the device or cause a denial of service.

Solution

Apply an Update

libupnp 1.6.18 has been released to address these vulnerabilities.

Restrict Access

Deploy firewall rules to block untrusted hosts from being able to access port 1900/udp.

Disable UPnP

Consider disabling UPnP on the device if it is not absolutely necessary.

Vendor Information (Learn More)

We attempted to notify more than 200 vendors identified by Rapid7 as running libupnp. The following list includes vendors who responded to our notification and vendors for whom we had existing security contact information.

VendorStatusDate NotifiedDate Updated
Cisco Systems, Inc.Affected13 Dec 201229 Jan 2013
D-Link Systems, Inc.Affected13 Dec 201231 Jan 2013
Fujitsu TechnologyAffected10 Jan 201329 Jan 2013
Huawei TechnologiesAffected13 Dec 201229 Jan 2013
ipitomyAffected08 Jan 201301 Feb 2013
LinksysAffected13 Dec 201229 Jan 2013
NEC CorporationAffected13 Dec 201229 Jan 2013
SiemensAffected13 Dec 201230 Jan 2013
Sony CorporationAffected13 Dec 201230 Jan 2013
SynologyAffected13 Dec 201228 Feb 2013
teldatNot Affected-05 Feb 2013
Ubiquiti NetworksNot Affected09 Jan 201329 Jan 2013
Yamaha CorporationNot Affected-01 Feb 2013
3com IncUnknown13 Dec 201229 Jan 2013
AxisUnknown13 Dec 201229 Jan 2013
If you are a vendor and your product is affected, let us know.View More »

CVSS Metrics (Learn More)

GroupScoreVector
Base10.0AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal8.7E:H/RL:OF/RC:C
Environmental6.6CDP:L/TD:M/CR:M/IR:M/AR:M

References

  • http://pupnp.sourceforge.net/
  • https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play
  • https://community.rapid7.com/docs/DOC-2150
  • https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf
  • http://www.rapid7.com/resources/free-security-software-downloads/universal-plug-and-play-jan-2013.jsp
  • http://www.kb.cert.org/vuls/id/357851
  • http://opentools.homeip.net/dev-tools-for-upnp
  • http://upnp.sourceforge.net/

Credit

Thanks to HD Moore of Rapid7 for reporting this vulnerability, and Tod Beardsley for coordination support.

This document was written by Jared Allar.

Other Information

  • CVE IDs:CVE-2012-5958CVE-2012-5959CVE-2012-5960CVE-2012-5961CVE-2012-5962CVE-2012-5963CVE-2012-5964CVE-2012-5965
  • Date Public:29 Jan 2013
  • Date First Published:29 Jan 2013
  • Date Last Updated:11 Mar 2013
  • Document Revision:66

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/922681

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18527
 
Oval ID: oval:org.mitre.oval:def:18527
Title: DSA-2615-1 libupnp4 - several
Description: Multiple stack-based buffer overflows were discovered in libupnp4, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function.
Family: unix Class: patch
Reference(s): DSA-2615-1
CVE-2012-5958
CVE-2012-5959
CVE-2012-5960
CVE-2012-5961
CVE-2012-5962
CVE-2012-5963
CVE-2012-5964
CVE-2012-5965
Version: 7
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): libupnp4
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19870
 
Oval ID: oval:org.mitre.oval:def:19870
Title: DSA-2614-1 libupnp - several
Description: Multiple stack-based buffer overflows were discovered in libupnp, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function.
Family: unix Class: patch
Reference(s): DSA-2614-1
CVE-2012-5958
CVE-2012-5959
CVE-2012-5960
CVE-2012-5961
CVE-2012-5962
CVE-2012-5963
CVE-2012-5964
CVE-2012-5965
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): libupnp
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 26
Application 26

Snort® IPS/IDS

Date Description
2018-05-23 libupnp command buffer overflow attempt
RuleID : 44743-community - Revision : 3 - Type : SERVER-OTHER
2017-12-07 libupnp command buffer overflow attempt
RuleID : 44743 - Revision : 3 - Type : SERVER-OTHER
2014-01-10 libupnp command buffer overflow attempt
RuleID : 25620 - Revision : 4 - Type : SERVER-OTHER
2014-01-10 libupnp command buffer overflow attempt
RuleID : 25619 - Revision : 4 - Type : SERVER-OTHER
2014-01-10 libupnp command buffer overflow attempt
RuleID : 25618 - Revision : 4 - Type : SERVER-OTHER
2014-01-10 libupnp command buffer overflow attempt
RuleID : 25617 - Revision : 4 - Type : SERVER-OTHER
2014-01-10 libupnp command buffer overflow attempt
RuleID : 25612 - Revision : 4 - Type : SERVER-OTHER
2014-01-10 libupnp command buffer overflow attempt
RuleID : 25601 - Revision : 4 - Type : SERVER-OTHER
2018-05-23 libupnp command buffer overflow attempt
RuleID : 25589-community - Revision : 6 - Type : SERVER-OTHER
2014-01-10 libupnp command buffer overflow attempt
RuleID : 25589 - Revision : 6 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-90.nasl - Type : ACT_GATHER_INFO
2014-03-27 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201403-06.nasl - Type : ACT_GATHER_INFO
2013-04-20 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-098.nasl - Type : ACT_GATHER_INFO
2013-02-21 Name : The remote Fedora host is missing a security update.
File : fedora_2013-2352.nasl - Type : ACT_GATHER_INFO
2013-02-21 Name : The remote Fedora host is missing a security update.
File : fedora_2013-2377.nasl - Type : ACT_GATHER_INFO
2013-02-13 Name : The remote Fedora host is missing a security update.
File : fedora_2013-1713.nasl - Type : ACT_GATHER_INFO
2013-02-13 Name : The remote Fedora host is missing a security update.
File : fedora_2013-1734.nasl - Type : ACT_GATHER_INFO
2013-02-13 Name : The remote Fedora host is missing a security update.
File : fedora_2013-1765.nasl - Type : ACT_GATHER_INFO
2013-02-04 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2614.nasl - Type : ACT_GATHER_INFO
2013-02-04 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2615.nasl - Type : ACT_GATHER_INFO
2013-02-01 Name : A network service running on the remote host is affected by multiple remote c...
File : libupnp_1_6_18.nasl - Type : ACT_GATHER_INFO
2013-01-31 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_2ea6ce3d6afd11e29d4ebcaec524bf84.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Date Informations
2020-05-23 13:17:16
  • Multiple Updates
2014-06-14 13:37:27
  • Multiple Updates
2014-02-17 12:08:16
  • Multiple Updates
2013-03-11 21:19:11
  • Multiple Updates
2013-03-11 21:17:13
  • Multiple Updates
2013-03-01 05:19:38
  • Multiple Updates
2013-03-01 05:17:44
  • Multiple Updates
2013-02-27 21:19:39
  • Multiple Updates
2013-02-27 21:17:32
  • Multiple Updates
2013-02-05 21:21:38
  • Multiple Updates
2013-02-05 21:19:28
  • Multiple Updates
2013-02-01 21:25:28
  • Multiple Updates
2013-02-01 21:22:45
  • Multiple Updates
2013-02-01 17:18:09
  • Multiple Updates
2013-02-01 13:21:49
  • Multiple Updates
2013-01-31 21:17:53
  • Multiple Updates
2013-01-31 17:17:58
  • Multiple Updates
2013-01-30 17:17:52
  • Multiple Updates
2013-01-30 00:20:47
  • Multiple Updates
2013-01-30 00:18:47
  • Multiple Updates
2013-01-29 21:19:51
  • Multiple Updates
2013-01-29 21:17:53
  • Multiple Updates
2013-01-29 17:18:59
  • First insertion