First published: Fri Nov 01 2019(Updated: )
MiniDLNA has heap-based buffer overflow
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Readymedia Project Readymedia | <1.1.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/minidlna | 1.3.0+dfsg-2+deb11u2 1.3.0+dfsg-2.2+deb12u1 1.3.3+dfsg-1 1.3.3+dfsg-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2739 is a vulnerability in MiniDLNA that allows a heap-based buffer overflow.
CVE-2013-2739 has a severity rating of 9.8 (critical).
CVE-2013-2739 affects MiniDLNA by allowing a heap-based buffer overflow, which can lead to arbitrary code execution.
To fix CVE-2013-2739, you should update to one of the recommended versions: 1.2.1+dfsg-2+deb10u3, 1.2.1+dfsg-2+deb10u4, 1.3.0+dfsg-2+deb11u2, 1.3.0+dfsg-2.2+deb12u1, or 1.3.3+dfsg-0.1, depending on your Debian version.
Yes, you can find additional references for CVE-2013-2739 at the following links: [http://archives.neohapsis.com/archives/bugtraq/2013-07/0100.html](http://archives.neohapsis.com/archives/bugtraq/2013-07/0100.html), [https://security-tracker.debian.org/tracker/CVE-2013-2739](https://security-tracker.debian.org/tracker/CVE-2013-2739), [http://www.securityfocus.com/archive/1/527299/30/0](http://www.securityfocus.com/archive/1/527299/30/0)