FS#46612 - [miniupnpc] Remote code execution fixed in newer upstream release

Attached to Project: Community Packages
Opened by a b (leper) - Thursday, 08 October 2015, 23:30 GMT
Last edited by Evangelos Foutras (foutrelis) - Friday, 16 October 2015, 16:25 GMT
Task Type Bug Report
Category Upstream Bugs
Status Closed
Assigned To Timothy Redaelli (tredaelli)
Architecture All
Severity Critical
Priority High
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 1
Private No

Details

Description:

miniupnpc versions prior to 1.9.20151008[2,3] are vulnerable to a buffer overflow which can lead to remote code execution[1].

Upgrading to 1.9.20151008 fixes the issue[4].

[1] http://talosintel.com/reports/TALOS-2015-0035/
[2] http://miniupnp.free.fr/files/download.php?file=miniupnpc-1.9.20151008.tar.gz
[3] http://miniupnp.free.fr/files/changelog.php?file=miniupnpc-1.9.20151008.tar.gz
[4] https://github.com/miniupnp/miniupnp/commit/79cca974a4c2ab1199786732a67ff6d898051b78
This task depends upon

Closed by  Evangelos Foutras (foutrelis)
Friday, 16 October 2015, 16:25 GMT
Reason for closing:  Fixed
Additional comments about closing:  miniupnpc 1.9.20151008-1
Comment by a b (leper) - Thursday, 15 October 2015, 23:04 GMT
Note that this was assigned CVE-2015-6031, which is still marked as reserved.
Comment by Levente Polyak (anthraxx) - Thursday, 15 October 2015, 23:08 GMT
thanks for the update. the package (and all its rebuilds that were needed) are currently in [community-testing] and soon be moved

Loading...