Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play", "name": "https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play", "tags": [], "refsource": "MISC"}, {"url": "http://pupnp.sourceforge.net/ChangeLog", "name": "http://pupnp.sourceforge.net/ChangeLog", "tags": [], "refsource": "CONFIRM"}, {"url": "https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf", "name": "https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf", "tags": [], "refsource": "MISC"}, {"url": "http://www.kb.cert.org/vuls/id/922681", "name": "VU#922681", "tags": ["Patch", "US Government Resource"], "refsource": "CERT-VN"}, {"url": "http://www.debian.org/security/2013/dsa-2614", "name": "DSA-2614", "tags": [], "refsource": "DEBIAN"}, {"url": "http://www.debian.org/security/2013/dsa-2615", "name": "DSA-2615", "tags": [], "refsource": "DEBIAN"}, {"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00013.html", "name": "openSUSE-SU-2013:0255", "tags": [], "refsource": "SUSE"}, {"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp", "name": "20130129 Portable SDK for UPnP Devices Contains Buffer Overflow Vulnerabilities", "tags": [], "refsource": "CISCO"}, {"url": "http://tsd.dlink.com.tw/temp/PMD/12966/DSR-150_A1_A2_Release_Notes_FW_v1.08B44_WW.pdf", "name": "http://tsd.dlink.com.tw/temp/PMD/12966/DSR-150_A1_A2_Release_Notes_FW_v1.08B44_WW.pdf", "tags": [], "refsource": "CONFIRM"}, {"url": "http://tsd.dlink.com.tw/temp/PMD/12879/DSR-500_500N_1000_1000N_A1_Release_Notes_FW_v1.08B77_WW.pdf", "name": "http://tsd.dlink.com.tw/temp/PMD/12879/DSR-500_500N_1000_1000N_A1_Release_Notes_FW_v1.08B77_WW.pdf", "tags": [], "refsource": "CONFIRM"}, {"url": "http://tsd.dlink.com.tw/temp/PMD/12960/DSR-150N_A2_Release_Notes_FW_v1.05B64_WW.pdf", "name": "http://tsd.dlink.com.tw/temp/PMD/12960/DSR-150N_A2_Release_Notes_FW_v1.05B64_WW.pdf", "tags": [], "refsource": "CONFIRM"}, {"url": "http://tsd.dlink.com.tw/temp/PMD/13039/DSR-250_250N_A1_A2_Release_Notes_FW_v1.08B44_WW_RU.pdf", "name": "http://tsd.dlink.com.tw/temp/PMD/13039/DSR-250_250N_A1_A2_Release_Notes_FW_v1.08B44_WW_RU.pdf", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:098", "name": "MDVSA-2013:098", "tags": [], "refsource": "MANDRIVA"}, {"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0037", "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0037", "tags": [], "refsource": "CONFIRM"}, {"url": "https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb", "name": "https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb", "tags": [], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/57602", "name": "57602", "tags": ["Exploit"], "refsource": "BID"}, {"url": "https://www.tenable.com/security/research/tra-2017-10", "name": "https://www.tenable.com/security/research/tra-2017-10", "tags": [], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka uuid) field within a string that contains a :: (colon colon) in a UDP packet."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-119"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2012-5959", "ASSIGNER": "cert@cert.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2013-01-31T21:55Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.6.17"}, {"cpe23Uri": "cpe:2.3:a:portable_sdk_for_upnp_project:portable_sdk_for_upnp:1.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2017-11-03T01:29Z"}