CVE-2013-1461

The ExecuteSoapAction function in the SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0 allows remote attackers to cause a denial of service (NULL pointer dereference and service crash) via a SOAPAction header that lacks a # (pound sign) character, a different vulnerability than CVE-2013-0230.
Configurations

Configuration 1 (hide)

cpe:2.3:a:miniupnp_project:miniupnpd:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:49

Type Values Removed Values Added
References () https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play - () https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play -
References () https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf - () https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf -
References () https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb - () https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb -

Information

Published : 2013-01-31 21:55

Updated : 2024-11-21 01:49


NVD link : CVE-2013-1461

Mitre link : CVE-2013-1461

CVE.ORG link : CVE-2013-1461


JSON object : View

Products Affected

miniupnp_project

  • miniupnpd