[<prev] [next>] [day] [month] [year] [list]
Message-id: <20130129151907-upnp-ep@psirt.cisco.com>
Date: Tue, 29 Jan 2013 15:18:26 -0500
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: bugtraq@...urityfocus.com
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Portable SDK for UPnP Devices Contains Buffer Overflow Vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Cisco Security Advisory: Portable SDK for UPnP Devices Contains Buffer Overflow
Vulnerabilities
Advisory ID: cisco-sa-20130129-upnp
Revision 1.0
For Public Release 2013 January 29 16:00 UTC (GMT)
+--------------------------------------------------------------------
Summary
=======
The Portable Software Developer Kit (SDK) for Universal Plug-n-Play
(UPnP) devices contain a libupnp library, originally known as the Intel
SDK for UPnP Devices, which is vulnerable to multiple stack-based
buffer overflows when handling malicious Simple Service Discovery
Protocol (SSDP) requests. This library is used in several vendor network
devices in addition to media streaming and file sharing applications.
These vulnerabilities were disclosed on January 29th, 2013 in a CERT
Vulnerability Note, VU#922681, which can be viewed at:
http://www.kb.cert.org/vuls/id/922681
Cisco is currently evaluating products for possible exposure to these
vulnerabilities. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iF4EAREIAAYFAlEIJZ8ACgkQUddfH3/BbTrUagD9FnKSVkc2iIfGs+7c8SVPT26+
ga5hYEz9UMUnitcqnbcBAIKe6KnkR6he2zbstVtbTKtqSjE7pfVb3lTKVZSeAkM5
=6sTu
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists