Lucene search

K
mageiaGentoo FoundationMGASA-2015-0416
HistoryOct 30, 2015 - 11:11 p.m.

Updated miniupnpc package fixes security vulnerability

2015-10-3023:11:10
Gentoo Foundation
advisories.mageia.org
9

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.0%

An exploitable buffer overflow vulnerability exists in the XML parser functionality of the MiniUPnP library. A specially crafted XML response can lead to a buffer overflow on the stack resulting in remote code execution. An attacker can set up a server on the local network to trigger this vulnerability (CVE-2015-6031).

OSVersionArchitecturePackageVersionFilename
Mageia5noarchminiupnpc< 1.9.20141128-1.1miniupnpc-1.9.20141128-1.1.mga5

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.0%