An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "gir1.2-soup-2.4",
"binary_version": "2.44.2-1ubuntu2.2"
},
{
"binary_name": "libsoup-gnome2.4-1",
"binary_version": "2.44.2-1ubuntu2.2"
},
{
"binary_name": "libsoup-gnome2.4-dev",
"binary_version": "2.44.2-1ubuntu2.2"
},
{
"binary_name": "libsoup2.4-1",
"binary_version": "2.44.2-1ubuntu2.2"
},
{
"binary_name": "libsoup2.4-dev",
"binary_version": "2.44.2-1ubuntu2.2"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "gir1.2-soup-2.4",
"binary_version": "2.52.2-1ubuntu0.2"
},
{
"binary_name": "libsoup-gnome2.4-1",
"binary_version": "2.52.2-1ubuntu0.2"
},
{
"binary_name": "libsoup-gnome2.4-dev",
"binary_version": "2.52.2-1ubuntu0.2"
},
{
"binary_name": "libsoup2.4-1",
"binary_version": "2.52.2-1ubuntu0.2"
},
{
"binary_name": "libsoup2.4-dev",
"binary_version": "2.52.2-1ubuntu0.2"
}
]
}