First published: Sat Feb 09 2019(Updated: )
Genivia gSOAP 2.7.x and 2.8.x before 2.8.75 allows attackers to cause a denial of service (application abort) or possibly have unspecified other impact if a server application is built with the -DWITH_COOKIES flag. This affects the C/C++ libgsoapck/libgsoapck++ and libgsoapssl/libgsoapssl++ libraries, as these are built with that flag.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Genivia gSOAP | >=2.7.0<=2.7.17 | |
Genivia gSOAP | >=2.8.0<2.8.75 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7659 is a vulnerability that allows attackers to cause a denial of service or potentially have other unspecified impacts in Genivia gSOAP 2.7.x and 2.8.x before 2.8.75.
CVE-2019-7659 affects Genivia gSOAP 2.7.x and 2.8.x before 2.8.75 if a server application is built with the -DWITH_COOKIES flag.
CVE-2019-7659 has a severity rating of 8.1 (high).
To mitigate CVE-2019-7659, update Genivia gSOAP to version 2.8.75 or later and rebuild the server application without the -DWITH_COOKIES flag.
You can find more information about CVE-2019-7659 in the Debian LTS announcement, the Outpost24 blog post, and the Genivia advisory.