6.8
CVSSv2

CVE-2015-6031

Published: 02/11/2015 Updated: 18/06/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the IGDstartelt function in igd_desc_parse.c in the MiniUPnP client (aka MiniUPnPc) prior to 1.9.20150917 allows remote UPNP servers to cause a denial of service (application crash) and possibly execute arbitrary code via an "oversized" XML element name.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

miniupnp project miniupnpc 1.9

miniupnp project miniupnpc

debian debian linux 7.0

debian debian linux 8.0

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

opensuse leap 42.1

opensuse opensuse 13.1

opensuse opensuse 13.2

Vendor Advisories

Debian Bug report logs - #802650 miniupnpc: CVE-2015-6031: Buffer overflow vulnerability in XML parser functionality Package: src:miniupnpc; Maintainer for src:miniupnpc is Thomas Goirand <zigo@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 22 Oct 2015 06:30:02 UTC Severity: grave Tags: ...
An application using the MiniUPnP library could be made to crash or run programs as your login if it received specially crafted network traffic ...
An application using the MiniUPnP library could be made to crash or run programs as your login if it received specially crafted network traffic ...