Heap-based buffer overflow in the create_url_list function in gena/gena_device.c in Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a valid URI followed by an invalid one in the CALLBACK header of an SUBSCRIBE request.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/92849 | |
https://security.gentoo.org/glsa/201701-52 | |
https://sourceforge.net/p/pupnp/bugs/133/ | Issue Tracking Third Party Advisory |
https://sourceforge.net/p/pupnp/code/ci/master/tree/ChangeLog | Release Notes Third Party Advisory |
https://www.debian.org/security/2016/dsa-3736 | Third Party Advisory |
https://www.tenable.com/security/research/tra-2017-10 |
Configurations
History
No history.
Information
Published : 2017-03-07 16:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-8863
Mitre link : CVE-2016-8863
CVE.ORG link : CVE-2016-8863
JSON object : View
Products Affected
libupnp_project
- libupnp
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer