MGASA-2015-0416

Source
https://advisories.mageia.org/MGASA-2015-0416.html
Import Source
https://advisories.mageia.org/MGASA-2015-0416.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0416
Related
Published
2015-10-30T20:11:10Z
Modified
2015-10-30T20:03:43Z
Summary
Updated miniupnpc package fixes security vulnerability
Details

An exploitable buffer overflow vulnerability exists in the XML parser functionality of the MiniUPnP library. A specially crafted XML response can lead to a buffer overflow on the stack resulting in remote code execution. An attacker can set up a server on the local network to trigger this vulnerability (CVE-2015-6031).

References
Credits

Affected packages

Mageia:5 / miniupnpc

Package

Name
miniupnpc
Purl
pkg:rpm/mageia/miniupnpc?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.20141128-1.1.mga5

Ecosystem specific

{
    "section": "core"
}