Lucene search

K
gentooGentoo FoundationGLSA-201801-08
HistoryJan 07, 2018 - 12:00 a.m.

MiniUPnPc: Arbitrary code execution

2018-01-0700:00:00
Gentoo Foundation
security.gentoo.org
11

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.0%

Background

The client library, enabling applications to access the services provided by an UPnP “Internet Gateway Device” present on the network.

Description

An exploitable buffer overflow vulnerability exists in the XML parser functionality of the MiniUPnP library.

Impact

A remote attacker, by enticing a user to connect to a malicious server, could cause the execution of arbitrary code with the privileges of the user running a MiniUPnPc linked application.

Workaround

There is no known workaround at this time.

Resolution

All MiniUPnPc users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-libs/miniupnpc-2.0.20170509"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-libs/miniupnpc< 2.0.20170509UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.0%