A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in GetOutboundPinholeTimeout in upnpsoap.c for rem_port.
References
Link | Resource |
---|---|
https://github.com/miniupnp/miniupnp/commit/13585f15c7f7dc28bbbba1661efb280d530d114c | Patch Third Party Advisory |
https://github.com/miniupnp/miniupnp/commit/86030db849260dd8fb2ed975b9890aef1b62b692 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/05/msg00045.html | |
https://usn.ubuntu.com/4542-1/ | |
https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp | Exploit Patch Third Party Advisory |
https://github.com/miniupnp/miniupnp/commit/13585f15c7f7dc28bbbba1661efb280d530d114c | Patch Third Party Advisory |
https://github.com/miniupnp/miniupnp/commit/86030db849260dd8fb2ed975b9890aef1b62b692 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/05/msg00045.html | |
https://usn.ubuntu.com/4542-1/ | |
https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/miniupnp/miniupnp/commit/13585f15c7f7dc28bbbba1661efb280d530d114c - Patch, Third Party Advisory | |
References | () https://github.com/miniupnp/miniupnp/commit/86030db849260dd8fb2ed975b9890aef1b62b692 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/05/msg00045.html - | |
References | () https://usn.ubuntu.com/4542-1/ - | |
References | () https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp - Exploit, Patch, Third Party Advisory |
Information
Published : 2019-05-15 23:29
Updated : 2024-11-21 04:22
NVD link : CVE-2019-12109
Mitre link : CVE-2019-12109
CVE.ORG link : CVE-2019-12109
JSON object : View
Products Affected
miniupnp_project
- miniupnpd
CWE
CWE-476
NULL Pointer Dereference