SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c.
[
{
"digest": {
"length": 1437.0,
"function_hash": "17412978122108628128205313404225853525"
},
"target": {
"function": "ssdp_recv",
"file": "ssdpd.c"
},
"source": "https://github.com/troglobit/ssdp-responder/commit/ce04b1f29a137198182f60bbb628d5ceb8171765",
"id": "CVE-2019-14323-7d576ea5",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"23675440767815601466155121921805401769",
"191837237767713511906825190932740659589",
"309572583394718331759132820840919521375",
"1246852956480482998889922411132589135",
"288667429010893025540662696312958281567",
"272783365725134883144992653352497519562",
"89538757152754704363560571935651457405",
"199015277947323880790993111259950380059"
]
},
"target": {
"file": "ssdpd.c"
},
"source": "https://github.com/troglobit/ssdp-responder/commit/ce04b1f29a137198182f60bbb628d5ceb8171765",
"id": "CVE-2019-14323-facd6d39",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
}
]