CVE-2012-5959

NameCVE-2012-5959
DescriptionStack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka uuid) field within a string that contains a :: (colon colon) in a UDP packet.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-2614-1, DSA-2615-1
NVD severityhigh (attack range: remote)
Debian Bugs699316, 699459
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libupnp (PTS)squeeze (security), squeeze1:1.6.6-5+squeeze1fixed
wheezy1:1.6.17-1.2fixed
jessie, sid1:1.6.19+git20141001-1fixed
libupnp4 (PTS)squeeze (security), squeeze1.8.0~svn20100507-1+squeeze1fixed
wheezy1.8.0~svn20100507-1.2fixed

The information above is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libupnpsource(unstable)1:1.6.17-1.2high699316
libupnpsourcesqueeze1:1.6.6-5+squeeze1highDSA-2614-1
libupnp4source(unstable)1.8.0~svn20100507-1.2high699459
libupnp4sourcesqueeze1.8.0~svn20100507-1+squeeze1highDSA-2615-1

Search for package or bug name: Reporting problems