CVE-2009-2174: denial of service (crash) via an empty (1) subscription or (2) control message

Related Vulnerabilities: CVE-2009-2174  

Debian Bug report logs - #534594
CVE-2009-2174: denial of service (crash) via an empty (1) subscription or (2) control message

version graph

Reported by: Giuseppe Iuculano <giuseppe@iuculano.it>

Date: Thu, 25 Jun 2009 16:48:05 UTC

Severity: important

Tags: lenny, security

Found in version 0.12.1-1

Fixed in version gupnp/0.12.6-3.1

Done: Nico Golde <nion@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Debian Testing Security Team <secure-testing-team@lists.alioth.debian.org>, Ross Burton <ross@debian.org>:
Bug#534594; Package gupnp. (Thu, 25 Jun 2009 16:48:08 GMT) (full text, mbox, link).


Acknowledgement sent to Giuseppe Iuculano <giuseppe@iuculano.it>:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Debian Testing Security Team <secure-testing-team@lists.alioth.debian.org>, Ross Burton <ross@debian.org>. (Thu, 25 Jun 2009 16:48:08 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Giuseppe Iuculano <giuseppe@iuculano.it>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2009-2174: denial of service (crash) via an empty (1) subscription or (2) control message
Date: Thu, 25 Jun 2009 18:44:42 +0200
Package: gupnp
Severity: important
Tags: security


Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for gupnp.

CVE-2009-2174[0]:
| GUPnP 0.12.7 allows remote attackers to cause a denial of service
| (crash) via an empty (1) subscription or (2) control message.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2174
    http://security-tracker.debian.net/tracker/CVE-2009-2174

Cheers,
Giuseppe.




Information forwarded to debian-bugs-dist@lists.debian.org, Ross Burton <ross@debian.org>:
Bug#534594; Package gupnp. (Wed, 01 Jul 2009 11:24:02 GMT) (full text, mbox, link).


Acknowledgement sent to Nico Golde <nion@debian.org>:
Extra info received and forwarded to list. Copy sent to Ross Burton <ross@debian.org>. (Wed, 01 Jul 2009 11:24:02 GMT) (full text, mbox, link).


Message #10 received at 534594@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: 534594@bugs.debian.org
Subject: intent to NMU
Date: Wed, 1 Jul 2009 13:13:49 +0200
[Message part 1 (text/plain, inline)]
Hi,
attached is a patch for a 0-day NMU that fixes the described 
issue.

Cheers
Nico

-- 
Nico Golde - http://www.ngolde.de - nion@jabber.ccc.de - GPG: 0xA0A0AAAA
For security reasons, all text in this mail is double-rot13 encrypted.
[gupnp-0.12.6-3_0.12.6-3.1.patch (text/x-diff, attachment)]
[Message part 3 (application/pgp-signature, inline)]

Reply sent to Nico Golde <nion@debian.org>:
You have taken responsibility. (Wed, 01 Jul 2009 11:39:05 GMT) (full text, mbox, link).


Notification sent to Giuseppe Iuculano <giuseppe@iuculano.it>:
Bug acknowledged by developer. (Wed, 01 Jul 2009 11:39:05 GMT) (full text, mbox, link).


Message #15 received at 534594-close@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: 534594-close@bugs.debian.org
Subject: Bug#534594: fixed in gupnp 0.12.6-3.1
Date: Wed, 01 Jul 2009 11:32:06 +0000
Source: gupnp
Source-Version: 0.12.6-3.1

We believe that the bug you reported is fixed in the latest version of
gupnp, which is due to be installed in the Debian FTP archive:

gupnp_0.12.6-3.1.diff.gz
  to pool/main/g/gupnp/gupnp_0.12.6-3.1.diff.gz
gupnp_0.12.6-3.1.dsc
  to pool/main/g/gupnp/gupnp_0.12.6-3.1.dsc
libgupnp-1.0-2_0.12.6-3.1_amd64.deb
  to pool/main/g/gupnp/libgupnp-1.0-2_0.12.6-3.1_amd64.deb
libgupnp-1.0-dbg_0.12.6-3.1_amd64.deb
  to pool/main/g/gupnp/libgupnp-1.0-dbg_0.12.6-3.1_amd64.deb
libgupnp-1.0-dev_0.12.6-3.1_amd64.deb
  to pool/main/g/gupnp/libgupnp-1.0-dev_0.12.6-3.1_amd64.deb
libgupnp-doc_0.12.6-3.1_all.deb
  to pool/main/g/gupnp/libgupnp-doc_0.12.6-3.1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 534594@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Golde <nion@debian.org> (supplier of updated gupnp package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 01 Jul 2009 13:10:13 +0200
Source: gupnp
Binary: libgupnp-1.0-2 libgupnp-1.0-dev libgupnp-1.0-dbg libgupnp-doc
Architecture: source all amd64
Version: 0.12.6-3.1
Distribution: unstable
Urgency: high
Maintainer: Ross Burton <ross@debian.org>
Changed-By: Nico Golde <nion@debian.org>
Description: 
 libgupnp-1.0-2 - GObject-based library for UPnP
 libgupnp-1.0-dbg - GObject-based library for UPnP (debug symbols)
 libgupnp-1.0-dev - GObject-based library for UPnP (development files)
 libgupnp-doc - GObject-based library for UPnP (documentation)
Closes: 534594
Changes: 
 gupnp (0.12.6-3.1) unstable; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * Fix remote denial of service that can be triggered via an action
     without any content (CVE-2009-2174; Closes: #534594).
Checksums-Sha1: 
 d425a9d6a19d0abd92bcbf975998984542232326 1113 gupnp_0.12.6-3.1.dsc
 48d5e629c7f41d55667556888a2fb83f50ba3f52 2824 gupnp_0.12.6-3.1.diff.gz
 a9b60fbae722df6c3284dcd8e691152d662c6cd3 84608 libgupnp-doc_0.12.6-3.1_all.deb
 ca5610711e1105fd858961f66171a4916a4c892b 73768 libgupnp-1.0-2_0.12.6-3.1_amd64.deb
 cb874520573f8b89fb7e8aed1421ab6eb9bef0bb 109678 libgupnp-1.0-dev_0.12.6-3.1_amd64.deb
 5967baf7be5e23138d6894fcaee480c2e0c6ffaf 143218 libgupnp-1.0-dbg_0.12.6-3.1_amd64.deb
Checksums-Sha256: 
 3e9c423ff79a22bc0268e5beab703b11c2e674dd3d7adb4b1c41cf6b9e0e72dc 1113 gupnp_0.12.6-3.1.dsc
 bfeb80af041b9c47d99e9814ba25015d319acbe25d8257cfebf2e53f7509df11 2824 gupnp_0.12.6-3.1.diff.gz
 0b7971ffb1951c577d294c2beffdeb18c87bbd6a3d5d14d49e76684751fefd53 84608 libgupnp-doc_0.12.6-3.1_all.deb
 eceb9ef4e8834603f1ab6834953ae6af6bbfe1040a2d5ae33abbc1de76d01be9 73768 libgupnp-1.0-2_0.12.6-3.1_amd64.deb
 bc835ab2e0407cc4b34e61f75bb1269e0a67fee2a4fee408685b6f67de4c5a01 109678 libgupnp-1.0-dev_0.12.6-3.1_amd64.deb
 756a90d6bfd255c0e5d74645f7635b641e1c6bba05903a3b0b9eb616e42c7f15 143218 libgupnp-1.0-dbg_0.12.6-3.1_amd64.deb
Files: 
 9fa86042cc90c1993793548e8b7ebdef 1113 libs optional gupnp_0.12.6-3.1.dsc
 60c2ccb7ccdafe80e1c540559d463aac 2824 libs optional gupnp_0.12.6-3.1.diff.gz
 9b3be5b225f01243192540e5510b540f 84608 doc optional libgupnp-doc_0.12.6-3.1_all.deb
 39cbe7b6fa4ff55038ececca2914c797 73768 libs optional libgupnp-1.0-2_0.12.6-3.1_amd64.deb
 8bb4b8ad70abfee0f036e78686b723b1 109678 libdevel optional libgupnp-1.0-dev_0.12.6-3.1_amd64.deb
 ebd68d7fe017cd213ec5c62ffb11f7fa 143218 libdevel extra libgupnp-1.0-dbg_0.12.6-3.1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkpLRPIACgkQHYflSXNkfP8qHwCeMpjOVOPRCbnX76OMQ1pHlS/F
xfgAn3jHGxD/6yR+x1orfNxIbsCy34Lm
=RuG3
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 08 Aug 2009 07:52:27 GMT) (full text, mbox, link).


Bug unarchived. Request was from Laurent Bigonville <bigon@debian.org> to control@bugs.debian.org. (Mon, 14 Dec 2009 14:33:04 GMT) (full text, mbox, link).


Bug Marked as found in versions 0.12.1-1. Request was from Laurent Bigonville <bigon@debian.org> to control@bugs.debian.org. (Mon, 14 Dec 2009 14:33:05 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Ross Burton <ross@debian.org>:
Bug#534594; Package gupnp. (Mon, 14 Dec 2009 14:39:02 GMT) (full text, mbox, link).


Acknowledgement sent to Laurent Bigonville <bigon@debian.org>:
Extra info received and forwarded to list. Copy sent to Ross Burton <ross@debian.org>. (Mon, 14 Dec 2009 14:39:02 GMT) (full text, mbox, link).


Message #26 received at 534594@bugs.debian.org (full text, mbox, reply):

From: Laurent Bigonville <bigon@debian.org>
To: 534594@bugs.debian.org
Subject: Re: CVE-2009-2174: denial of service (crash) via an empty (1) subscription or (2) control message
Date: Mon, 14 Dec 2009 15:31:53 +0100
unarchive 534594
found 534594 0.12.1-1
thanks

Looks like the version in stable still vulnerable.

Already contacted security team, the patch should go through s-p-u.

Laurent Bigonville




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 12 Jan 2010 07:34:38 GMT) (full text, mbox, link).


Bug unarchived. Request was from Laurent Bigonville <bigon@debian.org> to control@bugs.debian.org. (Mon, 22 Mar 2010 20:24:06 GMT) (full text, mbox, link).


Added tag(s) lenny. Request was from Laurent Bigonville <bigon@debian.org> to control@bugs.debian.org. (Mon, 22 Mar 2010 20:24:06 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 20 Apr 2010 07:38:54 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:00:54 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.