Executive Summary
Summary | |
---|---|
Title | Portable SDK for UPnP Devices Contains Buffer Overflow Vulnerabilities |
Informations | |||
---|---|---|---|
Name | cisco-sa-20130129-upnp | First vendor Publication | 2013-01-29 |
Vendor | Cisco | Last vendor Modification | 2013-01-29 |
Severity (Vendor) | N/A | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Portable Software Developer Kit (SDK) for Universal Plug-n-Play (UPnP) devices contain a libupnp library, originally known as the Intel SDK for UPnP Devices, which is vulnerable to multiple stack-based buffer overflows when handling malicious Simple Service Discovery Protocol (SSDP) requests. This library is used in several vendor network devices in addition to media streaming and file sharing applications. These vulnerabilities were disclosed on January 29th, 2013 in a CERT Vulnerability Note, VU#922681, which can be viewed at: http://www.kb.cert.org/vuls/id/922681 Cisco is currently evaluating products for possible exposure to these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp BEGIN PGP SIGNATURE Version: GnuPG v1.4.11 (GNU/Linux) iF4EAREIAAYFAlEIJZ8ACgkQUddfH3/BbTrUagD9FnKSVkc2iIfGs+7c8SVPT26 +ga5hYEz9UMUnitcqnbcBAIKe6KnkR6he2zbstVtbTKtqSjE7pfVb3lTKVZSeAkM5 =6sTu END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18527 | |||
Oval ID: | oval:org.mitre.oval:def:18527 | ||
Title: | DSA-2615-1 libupnp4 - several | ||
Description: | Multiple stack-based buffer overflows were discovered in libupnp4, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2615-1 CVE-2012-5958 CVE-2012-5959 CVE-2012-5960 CVE-2012-5961 CVE-2012-5962 CVE-2012-5963 CVE-2012-5964 CVE-2012-5965 | Version: | 7 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | libupnp4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19870 | |||
Oval ID: | oval:org.mitre.oval:def:19870 | ||
Title: | DSA-2614-1 libupnp - several | ||
Description: | Multiple stack-based buffer overflows were discovered in libupnp, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2614-1 CVE-2012-5958 CVE-2012-5959 CVE-2012-5960 CVE-2012-5961 CVE-2012-5962 CVE-2012-5963 CVE-2012-5964 CVE-2012-5965 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | libupnp |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2018-05-23 | libupnp command buffer overflow attempt RuleID : 44743-community - Revision : 3 - Type : SERVER-OTHER |
2017-12-07 | libupnp command buffer overflow attempt RuleID : 44743 - Revision : 3 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25620 - Revision : 4 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25619 - Revision : 4 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25618 - Revision : 4 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25617 - Revision : 4 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25612 - Revision : 4 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25601 - Revision : 4 - Type : SERVER-OTHER |
2018-05-23 | libupnp command buffer overflow attempt RuleID : 25589-community - Revision : 6 - Type : SERVER-OTHER |
2014-01-10 | libupnp command buffer overflow attempt RuleID : 25589 - Revision : 6 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-90.nasl - Type : ACT_GATHER_INFO |
2014-03-27 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201403-06.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-098.nasl - Type : ACT_GATHER_INFO |
2013-02-21 | Name : The remote Fedora host is missing a security update. File : fedora_2013-2352.nasl - Type : ACT_GATHER_INFO |
2013-02-21 | Name : The remote Fedora host is missing a security update. File : fedora_2013-2377.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote Fedora host is missing a security update. File : fedora_2013-1713.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote Fedora host is missing a security update. File : fedora_2013-1734.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote Fedora host is missing a security update. File : fedora_2013-1765.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2614.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2615.nasl - Type : ACT_GATHER_INFO |
2013-02-01 | Name : A network service running on the remote host is affected by multiple remote c... File : libupnp_1_6_18.nasl - Type : ACT_GATHER_INFO |
2013-01-31 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_2ea6ce3d6afd11e29d4ebcaec524bf84.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 10:22:07 |
|
2013-02-06 19:08:03 |
|
2013-01-30 00:18:48 |
|