Upstream information

CVE-2012-5958 at MITRE

Description

Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having critical severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 10
Vector AV:N/AC:L/Au:N/C:C/I:C/A:C
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entry: 801061 [RESOLVED / FIXED]

SUSE Security Advisories:

    openSUSE-SU-2013:0255-1

List of released packages

Product(s) Fixed package version(s) References
openSUSE Leap 15.2
  • libupnp6 >= 1.6.25-lp152.4.1
Patchnames:
openSUSE Leap 15.2 GA libupnp6-1.6.25-lp152.4.1
openSUSE Tumbleweed
  • libupnp-devel >= 1.6.19-1.8
  • libupnp6 >= 1.6.19-1.8
  • libupnp6-32bit >= 1.6.19-1.8
Patchnames:
openSUSE-Tumbleweed-2024-10300


SUSE Timeline for this CVE

CVE page created: Tue Jul 9 19:41:53 2013
CVE page last modified: Wed Sep 11 21:12:59 2024