Description
Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka uuid) field within a string that contains a :: (colon colon) in a UDP packet.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2614-1 | libupnp security update |
Debian DSA |
DSA-2615-1 | libupnp4 security update |
References
History
Wed, 28 May 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T21:21:28.462Z
Reserved: 2012-11-21T00:00:00.000Z
Link: CVE-2012-5959
No data.
Status : Modified
Published: 2013-01-31T21:55:01.083
Modified: 2026-04-29T01:13:23.040
Link: CVE-2012-5959
OpenCVE Enrichment
No data.
Debian DSA