Upstream information

CVE-2012-5963 at MITRE

Description

Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1 allows remote attackers to execute arbitrary code via a long UDN (aka uuid) field within a string that lacks a :: (colon colon) in a UDP packet.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having critical severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 10
Vector AV:N/AC:L/Au:N/C:C/I:C/A:C
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entry: 801061 [RESOLVED / FIXED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Leap 15.2
  • libupnp6 >= 1.6.25-lp152.4.1
Patchnames:
openSUSE Leap 15.2 GA libupnp6-1.6.25-lp152.4.1
openSUSE Tumbleweed
  • libupnp-devel >= 1.6.19-1.8
  • libupnp6 >= 1.6.19-1.8
  • libupnp6-32bit >= 1.6.19-1.8
Patchnames:
openSUSE Tumbleweed GA libupnp-devel-1.6.19-1.8


SUSE Timeline for this CVE

CVE page created: Tue Jul 9 19:41:54 2013
CVE page last modified: Fri Oct 7 12:46:21 2022