Executive Summary
Summary | |
---|---|
Title | Portable SDK for UPnP Devices (libupnp) contains multiple buffer overflows in SSDP |
Informations | |||
---|---|---|---|
Name | VU#922681 | First vendor Publication | 2013-01-29 |
Vendor | VU-CERT | Last vendor Modification | 2013-03-11 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#922681Portable SDK for UPnP Devices (libupnp) contains multiple buffer overflows in SSDPOverviewThe Portable SDK for UPnP Devices libupnp library contains multiple buffer overflow vulnerabilities. Devices that use libupnp may also accept UPnP queries over the WAN interface, therefore exposing the vulnerabilities to the internet. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThanks to HD Moore of Rapid7 for reporting this vulnerability, and Tod Beardsley for coordination support. This document was written by Jared Allar. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/922681 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18527 | |||
Oval ID: | oval:org.mitre.oval:def:18527 | ||
Title: | DSA-2615-1 libupnp4 - several | ||
Description: | Multiple stack-based buffer overflows were discovered in libupnp4, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2615-1 CVE-2012-5958 CVE-2012-5959 CVE-2012-5960 CVE-2012-5961 CVE-2012-5962 CVE-2012-5963 CVE-2012-5964 CVE-2012-5965 | Version: | 7 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | libupnp4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19870 | |||
Oval ID: | oval:org.mitre.oval:def:19870 | ||
Title: | DSA-2614-1 libupnp - several | ||
Description: | Multiple stack-based buffer overflows were discovered in libupnp, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2614-1 CVE-2012-5958 CVE-2012-5959 CVE-2012-5960 CVE-2012-5961 CVE-2012-5962 CVE-2012-5963 CVE-2012-5964 CVE-2012-5965 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | libupnp |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2018-05-23 | libupnp command buffer overflow attempt RuleID : 44743-community - Revision : 3 - Type : SERVER-OTHER |
2017-12-07 | libupnp command buffer overflow attempt RuleID : 44743 - Revision : 3 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25620 - Revision : 4 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25619 - Revision : 4 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25618 - Revision : 4 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25617 - Revision : 4 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25612 - Revision : 4 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25601 - Revision : 4 - Type : SERVER-OTHER |
2018-05-23 | libupnp command buffer overflow attempt RuleID : 25589-community - Revision : 6 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25589 - Revision : 6 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-90.nasl - Type : ACT_GATHER_INFO |
2014-03-27 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201403-06.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-098.nasl - Type : ACT_GATHER_INFO |
2013-02-21 | Name : The remote Fedora host is missing a security update. File : fedora_2013-2352.nasl - Type : ACT_GATHER_INFO |
2013-02-21 | Name : The remote Fedora host is missing a security update. File : fedora_2013-2377.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote Fedora host is missing a security update. File : fedora_2013-1713.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote Fedora host is missing a security update. File : fedora_2013-1734.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote Fedora host is missing a security update. File : fedora_2013-1765.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2614.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2615.nasl - Type : ACT_GATHER_INFO |
2013-02-01 | Name : A network service running on the remote host is affected by multiple remote c... File : libupnp_1_6_18.nasl - Type : ACT_GATHER_INFO |
2013-01-31 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_2ea6ce3d6afd11e29d4ebcaec524bf84.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-05-23 13:17:16 |
|
2014-06-14 13:37:27 |
|
2014-02-17 12:08:16 |
|
2013-03-11 21:19:11 |
|
2013-03-11 21:17:13 |
|
2013-03-01 05:19:38 |
|
2013-03-01 05:17:44 |
|
2013-02-27 21:19:39 |
|
2013-02-27 21:17:32 |
|
2013-02-05 21:21:38 |
|
2013-02-05 21:19:28 |
|
2013-02-01 21:25:28 |
|
2013-02-01 21:22:45 |
|
2013-02-01 17:18:09 |
|
2013-02-01 13:21:49 |
|
2013-01-31 21:17:53 |
|
2013-01-31 17:17:58 |
|
2013-01-30 17:17:52 |
|
2013-01-30 00:20:47 |
|
2013-01-30 00:18:47 |
|
2013-01-29 21:19:51 |
|
2013-01-29 21:17:53 |
|
2013-01-29 17:18:59 |
|