Integer signedness error in MiniUPnP MiniUPnPc v1.4.20101221 through v2.0 allows remote attackers to cause a denial of service or possibly have unspecified other impact.
References
Link | Resource |
---|---|
http://miniupnp.free.fr/files/changelog.php?file=miniupnpc-2.0.20170509.tar.gz | Release Notes Vendor Advisory |
https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-8798 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/04/msg00027.html | |
http://miniupnp.free.fr/files/changelog.php?file=miniupnpc-2.0.20170509.tar.gz | Release Notes Vendor Advisory |
https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-8798 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/04/msg00027.html |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://miniupnp.free.fr/files/changelog.php?file=miniupnpc-2.0.20170509.tar.gz - Release Notes, Vendor Advisory | |
References | () https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-8798 - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/04/msg00027.html - |
Information
Published : 2017-05-11 01:29
Updated : 2024-11-21 03:34
NVD link : CVE-2017-8798
Mitre link : CVE-2017-8798
CVE.ORG link : CVE-2017-8798
JSON object : View
Products Affected
miniupnp_project
- miniupnpd
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer