Multiple stack-based buffer overflows were discovered in libupnp4, a library
used for handling the Universal Plug and Play protocol. HD Moore from Rapid7
discovered that SSDP queries where not correctly handled by the
unique_service_name() function.
An attacker sending carefully crafted SSDP queries to a daemon built on
libupnp4 could generate a buffer overflow, overwriting the stack, leading to
the daemon crash and possible remote code execution.
For the stable distribution (squeeze), these problems have been fixed in
version 1.8.0~svn20100507-1+squeeze1.
For the testing distribution (wheezy), these problems have been fixed in
version 1.8.0~svn20100507-1.2.
For the unstable distribution (sid), these problems have been fixed in
version 1.8.0~svn20100507-1.2.
We recommend that you upgrade your libupnp4 packages.
CPE | Name | Operator | Version |
---|---|---|---|
libupnp4 | eq | 1.8.0~svn20100507-1 |