Описание
Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in Microsoft Windows XP SP2 allows remote attackers on the same subnet to execute arbitrary code via crafted HTTP headers in request or notification messages, which trigger memory corruption.
Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in Microsoft Windows XP SP2 allows remote attackers on the same subnet to execute arbitrary code via crafted HTTP headers in request or notification messages, which trigger memory corruption.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-1204
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-019
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2049
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=509
- http://secunia.com/advisories/24822
- http://www.osvdb.org/34010
- http://www.securityfocus.com/archive/1/466331/100/200/threaded
- http://www.securityfocus.com/bid/23371
- http://www.securitytracker.com/id?1017895
- http://www.vupen.com/english/advisories/2007/1323
Связанные уязвимости
Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in Microsoft Windows XP SP2 allows remote attackers on the same subnet to execute arbitrary code via crafted HTTP headers in request or notification messages, which trigger memory corruption.