CVE-2012-5960 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5960):
  Stack-based buffer overflow in the unique_service_name function in
  ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices
  (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows
  remote attackers to execute arbitrary code via a long UDN (aka
  upnp:rootdevice) field in a UDP packet.

CVE-2012-5959 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5959):
  Stack-based buffer overflow in the unique_service_name function in
  ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices
  (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows
  remote attackers to execute arbitrary code via a long UDN (aka uuid) field
  within a string that contains a :: (colon colon) in a UDP packet.

CVE-2012-5958 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5958):
  Stack-based buffer overflow in the unique_service_name function in
  ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices
  (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows
  remote attackers to execute arbitrary code via a UDP packet with a crafted
  string that is not properly handled after a certain pointer subtraction.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1110273

Title:
  [Security] Vulnerability on UPnP, need an update to libupnp 1.6.18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libupnp/+bug/1110273/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to