Gentoo Archives: gentoo-announce

From: Aaron Bauman <bman@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201801-08 ] MiniUPnPc: Arbitrary code execution
Date: Sun, 07 Jan 2018 23:58:28
Message-Id: 3703746.ED79X6X1tF@localhost.localdomain
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201801-08
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: MiniUPnPc: Arbitrary code execution
9 Date: January 07, 2018
10 Bugs: #562684
11 ID: 201801-08
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability in MiniUPnPc might allow remote attackers to execute
19 arbitrary code.
20
21 Background
22 ==========
23
24 The client library, enabling applications to access the services
25 provided by an UPnP "Internet Gateway Device" present on the network.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 net-libs/miniupnpc < 2.0.20170509 >= 2.0.20170509
34
35 Description
36 ===========
37
38 An exploitable buffer overflow vulnerability exists in the XML parser
39 functionality of the MiniUPnP library.
40
41 Impact
42 ======
43
44 A remote attacker, by enticing a user to connect to a malicious server,
45 could cause the execution of arbitrary code with the privileges of the
46 user running a MiniUPnPc linked application.
47
48 Workaround
49 ==========
50
51 There is no known workaround at this time.
52
53 Resolution
54 ==========
55
56 All MiniUPnPc users should upgrade to the latest version:
57
58 # emerge --sync
59 # emerge --ask --oneshot -v ">=net-libs/miniupnpc-2.0.20170509"
60
61 References
62 ==========
63
64 [ 1 ] CVE-2015-6031
65 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6031
66
67 Availability
68 ============
69
70 This GLSA and any updates to it are available for viewing at
71 the Gentoo Security Website:
72
73 https://security.gentoo.org/glsa/201801-08
74
75 Concerns?
76 =========
77
78 Security is a primary focus of Gentoo Linux and ensuring the
79 confidentiality and security of our users' machines is of utmost
80 importance to us. Any security concerns should be addressed to
81 security@g.o or alternatively, you may file a bug at
82 https://bugs.gentoo.org.
83
84 License

Attachments

File name MIME type
signature.asc application/pgp-signature