Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 27 Dec 2016 16:07:24 +0000 (UTC)
From:      Pawel Pekala <pawel@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r429627 - head/security/vuxml
Message-ID:  <201612271607.uBRG7OQr070650@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: pawel
Date: Tue Dec 27 16:07:23 2016
New Revision: 429627
URL: https://svnweb.freebsd.org/changeset/ports/429627

Log:
  Document devel/upnp 2 security vulnerabilities:
  - unhandled write of files to filesystem via POST by default
  - heap buffer overflow in create_url_list function

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Dec 27 15:34:55 2016	(r429626)
+++ head/security/vuxml/vuln.xml	Tue Dec 27 16:07:23 2016	(r429627)
@@ -58,6 +58,45 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="244c8288-cc4a-11e6-a475-bcaec524bf84">
+    <topic>upnp -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>upnp</name>
+	<range><lt>1.6.21</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Matthew Garett reports:</p>
+	<blockquote cite="https://twitter.com/mjg59/status/755062278513319936">;
+	  <p>Reported this to upstream 8 months ago without response,
+	    so: libupnp's default behaviour allows anyone to write to your
+	    filesystem. Seriously. Find a device running a libupnp based server
+	    (Shodan says there's rather a lot), and POST a file to /testfile.
+	    Then GET /testfile ... and yeah if the server is running as root
+	    (it is) and is using / as the web root (probably not, but maybe)
+	    this gives full host fs access.</p>
+	</blockquote>
+	<p>Scott Tenaglia reports:</p>
+	<blockquote cite="https://sourceforge.net/p/pupnp/bugs/133/">;
+	  <p>There is a heap buffer overflow vulnerability in the
+	    create_url_list function in upnp/src/gena/gena_device.c.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://twitter.com/mjg59/status/755062278513319936</url>;
+      <url>https://sourceforge.net/p/pupnp/bugs/133/</url>;
+      <cvename>CVE-2016-6255</cvename>
+      <cvename>CVE-2016-8863</cvename>
+    </references>
+    <dates>
+      <discovery>2016-02-23</discovery>
+      <entry>2016-12-27</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="c7656d4c-cb60-11e6-a9a5-b499baebfeaf">
     <topic>phpmailer -- Remote Code Execution</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201612271607.uBRG7OQr070650>