First published: Mon Nov 30 2020(Updated: )
ReadyMedia (aka MiniDLNA) before versions 1.3.0 allows remote code execution. Sending a malicious UPnP HTTP request to the miniDLNA service using HTTP chunked encoding can lead to a signedness bug resulting in a buffer overflow in calls to memcpy/memmove.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Readymedia Project Readymedia | <1.3.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/minidlna | <=1.2.1+dfsg-1<=1.2.1+dfsg-2 | 1.2.1+dfsg-2+deb10u1 1.2.1+dfsg-3 |
ubuntu/minidlna | <1.2.1+dfsg-1ubuntu0.18.04.1 | 1.2.1+dfsg-1ubuntu0.18.04.1 |
ubuntu/minidlna | <1.2.1+dfsg-1ubuntu0.20.04.1 | 1.2.1+dfsg-1ubuntu0.20.04.1 |
ubuntu/minidlna | <1.2.1+dfsg-2ubuntu0.1 | 1.2.1+dfsg-2ubuntu0.1 |
ubuntu/minidlna | <1.3.0 | 1.3.0 |
ubuntu/minidlna | <1.1.5+dfsg-2ubuntu0.1 | 1.1.5+dfsg-2ubuntu0.1 |
debian/minidlna | 1.3.0+dfsg-2+deb11u2 1.3.0+dfsg-2.2+deb12u1 1.3.3+dfsg-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-28926 is critical with a CVSS score of 9.8.
Remote code execution can be performed in CVE-2020-28926 by sending a malicious UPnP HTTP request to the miniDLNA service using HTTP chunked encoding.
A signedness bug resulting in a buffer overflow in calls to memcpy/memmove leads to the vulnerability in CVE-2020-28926.
To fix CVE-2020-28926, make sure you are using ReadyMedia (aka MiniDLNA) version 1.3.0 or higher.