Published
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse ignored package miniupnpd-nftables
- @LeSuisse accepted
- @LeSuisse published on GitHub
miniupnpd Integer Underflow SOAPAction Header Parsing
miniupnpd contains an integer underflow vulnerability in SOAPAction header parsing that allows remote attackers to cause a denial of service or information disclosure by sending a malformed SOAPAction header with a single quote. Attackers can trigger an out-of-bounds memory read by exploiting improper length validation in ParseHttpHeaders(), where the parsed length underflows to a large unsigned value when passed to memchr(), causing the process to scan memory far beyond the allocated HTTP request buffer.
References
Ignored references (2)
-
https://www.vulncheck.com/advisories/miniupnpd-integer-underflow-soapaction-hea… third-party-advisory
Affected products
miniupnpd
- <2.3.10