Heap-based buffer overflow in the create_url_list function in gena/gena_device.c in Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a valid URI followed by an invalid one in the CALLBACK header of an SUBSCRIBE request.
References
Link | Resource |
---|---|
https://www.debian.org/security/2016/dsa-3736 | Third Party Advisory |
https://sourceforge.net/p/pupnp/code/ci/master/tree/ChangeLog | Release Notes Third Party Advisory |
https://sourceforge.net/p/pupnp/bugs/133/ | Issue Tracking Third Party Advisory |
http://www.securityfocus.com/bid/92849 | |
https://security.gentoo.org/glsa/201701-52 | |
https://www.tenable.com/security/research/tra-2017-10 |
Information
Published : 2017-03-07 08:59
Updated : 2017-11-02 18:29
NVD link : CVE-2016-8863
Mitre link : CVE-2016-8863
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
debian
- debian_linux
libupnp_project
- libupnp