CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-9765 Genivia gSOAP Stack Based Buffer Overflow Vulnerability (Devils Ivy)

2017年9月7日 1657点热度 0人点赞 0条评论

漏洞类别:CGI

漏洞等级:

漏洞信息

Genivia gSOAP (Simple Object Access Protocol) is a web services toolkit, that is used to enable devices communicate with the internet.

Genivia gSOAP is prone to a stack-based buffer-overflow vulnerability because it fails to properly bounds check user-supplied data before copying it into an insufficiently sized buffer. A remote attacker could exploit this vulnerability to crash the SOAP WebServices daemon or execute arbitrary code on the product.

More details about this vulnerability can be found here: Devils Ivy.

Affected Versions:
Genivia gSOAP 2.7.x and 2.8.x before 2.8.48

QID Detection Logic:
Since the Genivia gSOAP toolkit versions can not be remotely detected, this unauthenticated QID detects vulnerable devices that use the toolkit. The individual vendor advisory can be found here:
ACV-116267

漏洞危害

Successful exploitation allows an attacker to execute arbitrary code, remotely access a video feed or deny the owner access to the feed leading to a denial of service vulnerability.

解决方案

Customers are advised to upgrade to Genivia 2.8.48 or later versions to remediate this vulnerability. Customers having the vulnerable product implemented in their IoT devices are advised to contact the respective vendors for updates pertaining to this vulnerability.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

Genivia 2.8.48 or later

0daybank

标签: 暂无
最后更新:2017年9月8日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me