what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files

libupnp 1.6.18 Denial Of Service
Posted Nov 26, 2020
Authored by Patrik Lantz

libupnp version 1.6.18 stack-based buffer overflow denial of service exploit.

tags | exploit, denial of service, overflow
advisories | CVE-2012-5958
SHA-256 | c665463d311c71b0bbf8b9944f268c319f51af690479e42161c8e133fef477b0

Related Files

Gentoo Linux Security Advisory 201701-52
Posted Jan 23, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201701-52 - Multiple vulnerabilities have been found in libupnp, the worst of which could lead to the execution of arbitrary code. Versions less than 1.6.21 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2016-6255, CVE-2016-8863
SHA-256 | 78afeb255dacc4cb68364b8459cf1878c4870f6370c0fb1127dd7de2af24f54f
Debian Security Advisory 3736-1
Posted Dec 16, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3736-1 - Two vulnerabilities were discovered in libupnp, a portable SDK for UPnP devices.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-6255, CVE-2016-8863
SHA-256 | 8b202cd7bbbe68db611c87ae37568f6c65a5c227e9e4303cedb683e9db82a0fa
Gentoo Linux Security Advisory 201403-06
Posted Mar 26, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201403-6 - Multiple buffer overflow flaws in libupnp may allow execution of arbitrary code. Versions less than 1.6.18 are affected.

tags | advisory, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2012-5958, CVE-2012-5959, CVE-2012-5960
SHA-256 | e03eb83d2a7aa7021aa08869a4d96954a3dadcdfda9b744e73250ff73718e8e7
Mandriva Linux Security Advisory 2013-098
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-098 - The Portable SDK for UPnP Devices libupnp library contains multiple buffer overflow vulnerabilities. Devices that use libupnp may also accept UPnP queries over the WAN interface, therefore exposing the vulnerabilities to the internet.

tags | advisory, overflow, vulnerability
systems | linux, mandriva
advisories | CVE-2012-5958, CVE-2012-5959, CVE-2012-5960, CVE-2012-5961, CVE-2012-5962, CVE-2012-5963, CVE-2012-5964, CVE-2012-5965
SHA-256 | f8496243e7f0256fe58f41cd2454656be93b6bfe7cf9d3facfeb6bad9b7497eb
Secunia Security Advisory 52124
Posted Feb 7, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for libupnp. This fixes three vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, suse
SHA-256 | 0f2e44b8d085a0ee97b6b59463e6bf375d60e8307340d164932b80e158d65594
Portable UPnP SDK unique_service_name() Remote Code Execution
Posted Feb 5, 2013
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a buffer overflow in the unique_service_name() function of libupnp's SSDP processor. The libupnp library is used across thousands of devices and is referred to as the Intel SDK for UPnP Devices or the Portable SDK for UPnP Devices. Due to size limitations on many devices, this exploit uses a separate TCP listener to stage the real payload.

tags | exploit, overflow, tcp
advisories | CVE-2012-5858
SHA-256 | a7af761c0a55f9166f6f6555c6b5bf62d458d99f52fd09af4ef8ec52d41ace3b
Secunia Security Advisory 52099
Posted Feb 5, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libupnp. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | 93fb3a5e72c264605175992725cf5d58f588952ec39b466ef4ff8b7f5288bdd3
Debian Security Advisory 2615-1
Posted Feb 4, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2615-1 - Multiple stack-based buffer overflows were discovered in libupnp4, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function.

tags | advisory, overflow, protocol
systems | linux, debian
advisories | CVE-2012-5958, CVE-2012-5959, CVE-2012-5960, CVE-2012-5961, CVE-2012-5962, CVE-2012-5963, CVE-2012-5964, CVE-2012-5965
SHA-256 | 3995c96856b81fca48ddb36fae97e693b485b9655d4843a24796b07552595498
Debian Security Advisory 2614-1
Posted Feb 4, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2614-1 - Multiple stack-based buffer overflows were discovered in libupnp, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function.

tags | advisory, overflow, protocol
systems | linux, debian
advisories | CVE-2012-5958, CVE-2012-5959, CVE-2012-5960, CVE-2012-5961, CVE-2012-5962, CVE-2012-5963, CVE-2012-5964, CVE-2012-5965
SHA-256 | 8b4ec6bd7b11036ad78a8dda85124db58bbe331d1cd2fee2af1493bd0aefc13d
Secunia Security Advisory 52023
Posted Feb 4, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libupnp4. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | 077238d372ec54710b79201e97414d0f1bb994915b109bb656ae09603e49ab53
Cisco Security Advisory 20130129-upnp
Posted Jan 30, 2013
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Portable Software Developer Kit (SDK) for Universal Plug-n-Play (UPnP) devices contain a libupnp library, originally known as the Intel SDK for UPnP Devices, which is vulnerable to multiple stack-based buffer overflows when handling malicious Simple Service Discovery Protocol (SSDP) requests.

tags | advisory, overflow, protocol
systems | cisco
SHA-256 | 8c9ec518f9576f7d3ec9cf9045faff6035b5098412a401f43bfbeeb4c0a728b0
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close