Lucene search

K
archlinuxArchLinuxASA-202105-26
HistoryMay 25, 2021 - 12:00 a.m.

[ASA-202105-26] gupnp: information disclosure

2021-05-2500:00:00
security.archlinux.org
187

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.002 Low

EPSS

Percentile

51.9%

Arch Linux Security Advisory ASA-202105-26

Severity: Medium
Date : 2021-05-25
CVE-ID : CVE-2021-33516
Package : gupnp
Type : information disclosure
Remote : Yes
Link : https://security.archlinux.org/AVG-1985

Summary

The package gupnp before version 1.2.6-1 is vulnerable to information
disclosure.

Resolution

Upgrade to 1.2.6-1.

pacman -Syu “gupnp>=1.2.6-1”

The problem has been fixed upstream in version 1.2.6.

Workaround

None.

Description

An issue was discovered in GUPnP before 1.2.5. It allows DNS rebinding.
A remote web server can exploit this vulnerability to trick a victim’s
browser into triggering actions against local UPnP services implemented
using this library. Depending on the affected service, this could be
used for data exfiltration, data tampering, etc.

Impact

A remote attacker can use DNS rebinding to trick a victim’s browser
into triggering actions against local UPnP services.

References

https://discourse.gnome.org/t/security-relevant-releases-for-gupnp-issue-cve-2021-33516/6536
https://gitlab.gnome.org/GNOME/gupnp/-/issues/24
https://gitlab.gnome.org/GNOME/gupnp/-/merge_requests/13
https://gitlab.gnome.org/GNOME/gupnp/-/commit/ca6ec9dcb26fd7a2a630eb6a68118659b589afac
https://security.archlinux.org/CVE-2021-33516

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanygupnp< 1.2.6-1UNKNOWN

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.002 Low

EPSS

Percentile

51.9%