DSA-2614-1 libupnp -- several vulnerabilities

Related Vulnerabilities: CVE-2012-5958   CVE-2012-5959   CVE-2012-5960   CVE-2012-5961   CVE-2012-5962   CVE-2012-5963   CVE-2012-5964   CVE-2012-5965  

Multiple stack-based buffer overflows were discovered in libupnp, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function. An attacker sending carefully crafted SSDP queries to a daemon built on libupnp could generate a buffer overflow, overwriting the stack, leading to the daemon crash and possible remote code execution. For the stable distribution (squeeze), these problems have been fixed in version 1:1.6.6-5+squeeze1. For the testing distribution (wheezy), these problems have been fixed in version 1:1.6.17-1.2. For the unstable distribution (sid), these problems have been fixed in version 1:1.6.17-1.2. We recommend that you upgrade your libupnp packages.

Debian Security Advisory

DSA-2614-1 libupnp -- several vulnerabilities

Date Reported:
01 Feb 2013
Affected Packages:
libupnp
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 699316.
In Mitre's CVE dictionary: CVE-2012-5958, CVE-2012-5959, CVE-2012-5960, CVE-2012-5961, CVE-2012-5962, CVE-2012-5963, CVE-2012-5964, CVE-2012-5965.
More information:

Multiple stack-based buffer overflows were discovered in libupnp, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function.

An attacker sending carefully crafted SSDP queries to a daemon built on libupnp could generate a buffer overflow, overwriting the stack, leading to the daemon crash and possible remote code execution.

For the stable distribution (squeeze), these problems have been fixed in version 1:1.6.6-5+squeeze1.

For the testing distribution (wheezy), these problems have been fixed in version 1:1.6.17-1.2.

For the unstable distribution (sid), these problems have been fixed in version 1:1.6.17-1.2.

We recommend that you upgrade your libupnp packages.