Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. NOTE: the large document would be blocked by many common web-server configurations on general-purpose computers.
References
Link | Resource |
---|---|
https://www.genivia.com/changelog.html#Version_2.8.48_upd_%2806/21/2017%29 | Release Notes Vendor Advisory |
https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_%28June_21,_2017%29 | Patch Vendor Advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1049348 | Issue Tracking Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1472807 | Issue Tracking Third Party Advisory VDB Entry |
http://blog.senr.io/devilsivy.html | Exploit Technical Description Third Party Advisory |
http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions | Mitigation Technical Description Third Party Advisory |
http://www.securityfocus.com/bid/99868 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-07-19 17:29
Updated : 2017-09-16 03:25
NVD link : CVE-2017-9765
Mitre link : CVE-2017-9765
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
genivia
- gsoap