Lucene search

K
freebsdFreeBSD244C8288-CC4A-11E6-A475-BCAEC524BF84
HistoryFeb 23, 2016 - 12:00 a.m.

upnp -- multiple vulnerabilities

2016-02-2300:00:00
vuxml.freebsd.org
20

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.035 Low

EPSS

Percentile

91.6%

Matthew Garett reports:

Reported this to upstream 8 months ago without response,
so: libupnp’s default behaviour allows anyone to write to your
filesystem. Seriously. Find a device running a libupnp based server
(Shodan says there’s rather a lot), and POST a file to /testfile.
Then GET /testfile … and yeah if the server is running as root
(it is) and is using / as the web root (probably not, but maybe)
this gives full host fs access.

Scott Tenaglia reports:

There is a heap buffer overflow vulnerability in the
create_url_list function in upnp/src/gena/gena_device.c.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchupnp< 1.6.21UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.035 Low

EPSS

Percentile

91.6%