vendor:
libupnp
by:
Patrik Lantz
7.5
CVSS
HIGH
Stack-based buffer overflow
119
CWE
Product Name: libupnp
Affected Version From: <= 1.6.6
Affected Version To: <= 1.6.6
Patch Exists: YES
Related CWE: CVE-2012-5958
CPE: a:pupnp:libupnp
Other Scripts:
N/A
Platforms Tested: Linux
2020
libupnp 1.6.18 – Stack-based buffer overflow (DoS)
A stack-based buffer overflow vulnerability exists in libupnp 1.6.18, which could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to a lack of proper validation of user-supplied data when handling M-SEARCH packets. An attacker can send a specially crafted M-SEARCH packet to the vulnerable server, resulting in a stack-based buffer overflow. This can allow the attacker to execute arbitrary code in the context of the application.
Mitigation:
Upgrade to the latest version of libupnp