First published: Thu Jan 31 2013(Updated: )
Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libupnp Project Libupnp | <=1.6.17 | |
Libupnp Project Libupnp | =1.4.0 | |
Libupnp Project Libupnp | =1.4.1 | |
Libupnp Project Libupnp | =1.4.2 | |
Libupnp Project Libupnp | =1.4.3 | |
Libupnp Project Libupnp | =1.4.4 | |
Libupnp Project Libupnp | =1.4.5 | |
Libupnp Project Libupnp | =1.4.6 | |
Libupnp Project Libupnp | =1.4.7 | |
Libupnp Project Libupnp | =1.6.0 | |
Libupnp Project Libupnp | =1.6.1 | |
Libupnp Project Libupnp | =1.6.2 | |
Libupnp Project Libupnp | =1.6.3 | |
Libupnp Project Libupnp | =1.6.4 | |
Libupnp Project Libupnp | =1.6.5 | |
Libupnp Project Libupnp | =1.6.6 | |
Libupnp Project Libupnp | =1.6.7 | |
Libupnp Project Libupnp | =1.6.8 | |
Libupnp Project Libupnp | =1.6.9 | |
Libupnp Project Libupnp | =1.6.10 | |
Libupnp Project Libupnp | =1.6.11 | |
Libupnp Project Libupnp | =1.6.12 | |
Libupnp Project Libupnp | =1.6.13 | |
Libupnp Project Libupnp | =1.6.14 | |
Libupnp Project Libupnp | =1.6.15 | |
Libupnp Project Libupnp | =1.6.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.