what you don't know can hurt you
Showing 1 - 11 of 11 RSS Feed

Files

libupnp 1.6.18 Denial Of Service
Posted Nov 26, 2020
Authored by Patrik Lantz

libupnp version 1.6.18 stack-based buffer overflow denial of service exploit.

tags | exploit, denial of service, overflow
advisories | CVE-2012-5958
MD5 | eec0f79236ada16154ef65b5142e8111

Related Files

Gentoo Linux Security Advisory 201701-52
Posted Jan 23, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201701-52 - Multiple vulnerabilities have been found in libupnp, the worst of which could lead to the execution of arbitrary code. Versions less than 1.6.21 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2016-6255, CVE-2016-8863
MD5 | e519f3500f6b3bf6befab93337b67628
Debian Security Advisory 3736-1
Posted Dec 16, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3736-1 - Two vulnerabilities were discovered in libupnp, a portable SDK for UPnP devices.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-6255, CVE-2016-8863
MD5 | b4ef21ecca510d261901f7e90f7d0a5f
Gentoo Linux Security Advisory 201403-06
Posted Mar 26, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201403-6 - Multiple buffer overflow flaws in libupnp may allow execution of arbitrary code. Versions less than 1.6.18 are affected.

tags | advisory, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2012-5958, CVE-2012-5959, CVE-2012-5960
MD5 | 04803b0fd73bc2e0f193a6154bbc1c16
Mandriva Linux Security Advisory 2013-098
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-098 - The Portable SDK for UPnP Devices libupnp library contains multiple buffer overflow vulnerabilities. Devices that use libupnp may also accept UPnP queries over the WAN interface, therefore exposing the vulnerabilities to the internet.

tags | advisory, overflow, vulnerability
systems | linux, mandriva
advisories | CVE-2012-5958, CVE-2012-5959, CVE-2012-5960, CVE-2012-5961, CVE-2012-5962, CVE-2012-5963, CVE-2012-5964, CVE-2012-5965
MD5 | 0f1cb943809708b57ea209570468246f
Secunia Security Advisory 52124
Posted Feb 7, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for libupnp. This fixes three vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, suse
MD5 | 2ba9385b4c07fea626704641bea88c2c
Portable UPnP SDK unique_service_name() Remote Code Execution
Posted Feb 5, 2013
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a buffer overflow in the unique_service_name() function of libupnp's SSDP processor. The libupnp library is used across thousands of devices and is referred to as the Intel SDK for UPnP Devices or the Portable SDK for UPnP Devices. Due to size limitations on many devices, this exploit uses a separate TCP listener to stage the real payload.

tags | exploit, overflow, tcp
advisories | CVE-2012-5858
MD5 | 8a2d4e5a5036082bd64360fbe4d78a67
Secunia Security Advisory 52099
Posted Feb 5, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libupnp. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, debian
MD5 | 867932398eed0ed2ade46258ed2af684
Debian Security Advisory 2615-1
Posted Feb 4, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2615-1 - Multiple stack-based buffer overflows were discovered in libupnp4, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function.

tags | advisory, overflow, protocol
systems | linux, debian
advisories | CVE-2012-5958, CVE-2012-5959, CVE-2012-5960, CVE-2012-5961, CVE-2012-5962, CVE-2012-5963, CVE-2012-5964, CVE-2012-5965
MD5 | 5d9a2dadf351ccaaf7a6932bf94504f6
Debian Security Advisory 2614-1
Posted Feb 4, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2614-1 - Multiple stack-based buffer overflows were discovered in libupnp, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function.

tags | advisory, overflow, protocol
systems | linux, debian
advisories | CVE-2012-5958, CVE-2012-5959, CVE-2012-5960, CVE-2012-5961, CVE-2012-5962, CVE-2012-5963, CVE-2012-5964, CVE-2012-5965
MD5 | cf7452d176447288650e3886a76a83c2
Secunia Security Advisory 52023
Posted Feb 4, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libupnp4. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, debian
MD5 | 5d6a3d5e6df099cc899805e5ad70408d
Cisco Security Advisory 20130129-upnp
Posted Jan 30, 2013
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Portable Software Developer Kit (SDK) for Universal Plug-n-Play (UPnP) devices contain a libupnp library, originally known as the Intel SDK for UPnP Devices, which is vulnerable to multiple stack-based buffer overflows when handling malicious Simple Service Discovery Protocol (SSDP) requests.

tags | advisory, overflow, protocol
systems | cisco
MD5 | f35a6f964ddb201d9627cff36272c7b0
Page 1 of 1
Back1Next

File Archive:

July 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    13 Files
  • 2
    Jul 2nd
    12 Files
  • 3
    Jul 3rd
    1 Files
  • 4
    Jul 4th
    2 Files
  • 5
    Jul 5th
    34 Files
  • 6
    Jul 6th
    21 Files
  • 7
    Jul 7th
    21 Files
  • 8
    Jul 8th
    13 Files
  • 9
    Jul 9th
    6 Files
  • 10
    Jul 10th
    1 Files
  • 11
    Jul 11th
    3 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    19 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    15 Files
  • 16
    Jul 16th
    9 Files
  • 17
    Jul 17th
    2 Files
  • 18
    Jul 18th
    2 Files
  • 19
    Jul 19th
    19 Files
  • 20
    Jul 20th
    21 Files
  • 21
    Jul 21st
    53 Files
  • 22
    Jul 22nd
    14 Files
  • 23
    Jul 23rd
    14 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close