First published: Thu Jun 04 2020(Updated: )
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libupnp | <=1.12.1 | |
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13848 has a severity rating that allows remote attackers to cause a denial of service by exploiting a NULL pointer dereference.
To fix CVE-2020-13848, upgrade Portable UPnP SDK to version 1.12.2 or later.
CVE-2020-13848 affects Portable UPnP SDK versions 1.12.1 and earlier.
CVE-2020-13848 impacts Debian Linux version 8.0 and any software utilizing affected versions of libupnp.
CVE-2020-13848 is a denial of service vulnerability resulting from a crafted SSDP message leading to a crash.