Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-5958

Опубликовано: 31 янв. 2013
Источник: ubuntu
Приоритет: medium
EPSS Высокий
CVSS2: 10

Описание

Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.

РелизСтатусПримечание
devel

not-affected

1:1.6.17-1.2
hardy

ignored

end of life
lucid

released

1:1.6.6-4ubuntu0.1
oneiric

released

1:1.6.6-5.1ubuntu0.11.10.1
precise

released

1:1.6.6-5.1ubuntu0.12.04.1
quantal

released

1.6.17-1.1ubuntu0.12.10.1
raring

not-affected

1:1.6.17-1.2
saucy

not-affected

1:1.6.17-1.2
upstream

released

1:1.6.17-1.2

Показывать по

РелизСтатусПримечание
devel

not-affected

1.8.0~svn20100507-1.2
hardy

DNE

lucid

ignored

end of life
oneiric

released

1.8.0~svn20100507-1.1ubuntu0.11.10.1
precise

released

1.8.0~svn20100507-1.1ubuntu0.12.04.1
quantal

released

1.8.0~svn20100507-1.1ubuntu0.12.10.1
raring

not-affected

1.8.0~svn20100507-1.2
saucy

not-affected

1.8.0~svn20100507-1.2
upstream

released

1.8.0~svn20100507-1.2

Показывать по

Ссылки на источники

EPSS

Процентиль: 99%
0.88128
Высокий

10 Critical

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.

nvd
больше 12 лет назад

Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.

debian
больше 12 лет назад

Stack-based buffer overflow in the unique_service_name function in ssd ...

github
больше 3 лет назад

Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.

fstec
больше 11 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 99%
0.88128
Высокий

10 Critical

CVSS2