The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (out-of-bounds memory access and daemon crash) via vectors involving a negative length value.
References
Link | Resource |
---|---|
http://speirofr.appspot.com/files/advisory/SPADV-2016-02.md | Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/03/16/13 | Mailing List Patch Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816759 | Issue Tracking Mailing List Patch Third Party Advisory |
https://github.com/miniupnp/miniupnp/commit/b238cade9a173c6f751a34acf8ccff838a62aa47 | Patch Third Party Advisory |
http://speirofr.appspot.com/files/advisory/SPADV-2016-02.md | Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/03/16/13 | Mailing List Patch Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816759 | Issue Tracking Mailing List Patch Third Party Advisory |
https://github.com/miniupnp/miniupnp/commit/b238cade9a173c6f751a34acf8ccff838a62aa47 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 02:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://speirofr.appspot.com/files/advisory/SPADV-2016-02.md - Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/03/16/13 - Mailing List, Patch, Third Party Advisory | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816759 - Issue Tracking, Mailing List, Patch, Third Party Advisory | |
References | () https://github.com/miniupnp/miniupnp/commit/b238cade9a173c6f751a34acf8ccff838a62aa47 - Patch, Third Party Advisory |
Information
Published : 2017-03-24 15:59
Updated : 2024-11-21 02:49
NVD link : CVE-2016-3178
Mitre link : CVE-2016-3178
CVE.ORG link : CVE-2016-3178
JSON object : View
Products Affected
miniupnp_project
- minissdpd
CWE
CWE-125
Out-of-bounds Read