Genivia gSOAP 2.7.x and 2.8.x before 2.8.75 allows attackers to cause a denial of service (application abort) or possibly have unspecified other impact if a server application is built with the -DWITH_COOKIES flag. This affects the C/C++ libgsoapck/libgsoapck++ and libgsoapssl/libgsoapssl++ libraries, as these are built with that flag.
References
Link | Resource |
---|---|
https://www.genivia.com/advisory.html#Bug_in_gSOAP_versions_2.7.0_to_2.8.74_for_applications_built_with_the_WITH_COOKIES_flag_enabled_(Jan_14,_2019) | Exploit Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2019/02/msg00027.html | Mailing List Third Party Advisory |
https://outpost24.com/blog/gsoap-vulnerability-identified |
Information
Published : 2019-02-09 06:29
Updated : 2020-08-24 10:37
NVD link : CVE-2019-7659
Mitre link : CVE-2019-7659
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
genivia
- gsoap