First published: Wed Apr 09 2014(Updated: )
miniupnpc-1.8-1.fc20 miniupnpc-1.8-1.fc19 <a href="http://miniupnp.free.fr/files/changelog.php?file=miniupnpc-1.9.20140401.tar.gz">http://miniupnp.free.fr/files/changelog.php?file=miniupnpc-1.9.20140401.tar.gz</a> 2013/10/07: fixed potential buffer overrun in miniwget.c Modified UPNP_GetValidIGD() to check for ExternalIpAddress <a href="https://github.com/miniupnp/miniupnp/commit/3a87aa2f10bd7f1408e1849bdb59c41dd63a9fe9">https://github.com/miniupnp/miniupnp/commit/3a87aa2f10bd7f1408e1849bdb59c41dd63a9fe9</a> Appears to be a DoS crash vector that can be triggered by something on the network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/miniupnpc-1.9 | <1. | 1. |
miniUPnP | =1.9 | |
Open edX | =12.3 | |
Open edX | =13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3985 is classified as having a medium severity due to potential buffer overflow vulnerabilities.
To fix CVE-2014-3985, upgrade to miniupnpc version 1.9 or later.
CVE-2014-3985 affects miniupnpc versions below 1.9, particularly on distributions like Fedora and openSUSE.
CVE-2014-3985 involves a potential buffer overrun in the miniwget component of the miniupnpc library.
While upgrading is the best solution, users can limit access to the affected software or utilize firewalls to mitigate risks until an update is applied.