Описание
SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c.
Ссылки
- PatchThird Party Advisory
- ExploitIssue TrackingPatchThird Party Advisory
- PatchThird Party Advisory
- ExploitIssue TrackingPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 1.0 (включая) до 1.5 (включая)
cpe:2.3:a:simple_service_discovery_protocol_responder_project:simple_service_discovery_protocol_responder:*:*:*:*:*:*:*:*
EPSS
Процентиль: 53%
0.00297
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-193
Связанные уязвимости
github
больше 3 лет назад
SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c.
EPSS
Процентиль: 53%
0.00297
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-193