The remote host is missing an update for the 'miniupnpd' package(s) announced via the USN-4542-1 advisory. It was discovered that MiniUPnPd did not properly validate callback addresses, handled unpopulated user XML input incorrectly, mishandled description when port mapping, and did not properly parse certain PCP requests, potentially resulting in sensitive information exposure and denial of service
Reporter | Title | Published | Views | Family All 63 |
---|---|---|---|---|
![]() | miniupnpd vulnerabilities | 25 Sep 202015:26 | – | osv |
![]() | miniupnpd - security update | 30 May 201900:00 | – | osv |
![]() | CVE-2019-12110 | 15 May 201923:29 | – | osv |
![]() | CVE-2019-12109 | 15 May 201923:29 | – | osv |
![]() | CVE-2019-12107 | 15 May 201923:29 | – | osv |
![]() | CVE-2019-12111 | 15 May 201923:29 | – | osv |
![]() | CVE-2019-12108 | 15 May 201923:29 | – | osv |
![]() | Ubuntu 16.04 LTS : MiniUPnPd vulnerabilities (USN-4542-1) | 26 Sep 202000:00 | – | nessus |
![]() | Fedora 31 : miniupnpd (2019-0a26e06dd5) | 7 Oct 201900:00 | – | nessus |
![]() | Debian DLA-1811-1 : miniupnpd security update | 31 May 201900:00 | – | nessus |
Source | Link |
---|---|
ubuntu | www.ubuntu.com/security/notices/USN-4542-1 |
# SPDX-FileCopyrightText: 2020 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.844614");
script_cve_id("CVE-2019-12107", "CVE-2019-12108", "CVE-2019-12109", "CVE-2019-12110", "CVE-2019-12111");
script_tag(name:"creation_date", value:"2020-09-26 03:00:31 +0000 (Sat, 26 Sep 2020)");
script_version("2024-02-02T05:06:07+0000");
script_tag(name:"last_modification", value:"2024-02-02 05:06:07 +0000 (Fri, 02 Feb 2024)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2019-05-16 15:48:07 +0000 (Thu, 16 May 2019)");
script_name("Ubuntu: Security Advisory (USN-4542-1)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2020 Greenbone AG");
script_family("Ubuntu Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU16\.04\ LTS");
script_xref(name:"Advisory-ID", value:"USN-4542-1");
script_xref(name:"URL", value:"https://ubuntu.com/security/notices/USN-4542-1");
script_tag(name:"summary", value:"The remote host is missing an update for the 'miniupnpd' package(s) announced via the USN-4542-1 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"It was discovered that MiniUPnPd did not properly validate callback
addresses. A remote attacker could possibly use this issue to expose
sensitive information. (CVE-2019-12107)
It was discovered that MiniUPnPd incorrectly handled unpopulated user XML
input. An attacker could possibly use this issue to cause MiniUPnPd to
crash, resulting in a denial of service. (CVE-2019-12108, CVE-2019-12109)
It was discovered that MiniUPnPd incorrectly handled an empty description
when port mapping. An attacker could possibly use this issue to cause
MiniUPnPd to crash, resulting in a denial of service. (CVE-2019-12110)
It was discovered that MiniUPnPd did not properly parse certain PCP
requests. An attacker could possibly use this issue to cause MiniUPnPd to
crash, resulting in a denial of service. (CVE-2019-12111)");
script_tag(name:"affected", value:"'miniupnpd' package(s) on Ubuntu 16.04.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
release = dpkg_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "UBUNTU16.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"miniupnpd", ver:"1.8.20140523-4.1+deb9u2build0.16.04.1", rls:"UBUNTU16.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo