[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3379-1 miniupnpc -- miniupnpc

ID: oval:org.secpod.oval:def:602252Date: (C)2015-10-28   (M)2021-06-02
Class: PATCHFamily: unix




Aleksandar Nikolic of Cisco Talos discovered a buffer overflow vulnerability in the XML parser functionality of miniupnpc, a UPnP IGD client lightweight library. A remote attacker can take advantage of this flaw to cause an application using the miniupnpc library to crash, or potentially to execute arbitrary code with the privileges of the user running the application.

Platform:
Debian 8.x
Debian 7.x
Product:
miniupnpc
Reference:
DSA-3379-1
CVE-2015-6031
CVE    1
CVE-2015-6031
CPE    3
cpe:/a:miniupnpc:miniupnpc
cpe:/o:debian:debian_linux:7.x
cpe:/o:debian:debian_linux:8.x

© SecPod Technologies