Vulnerabilities > CVE-2009-2174 - Denial Of Service vulnerability in Gupnp 0.12.7

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
gupnp
nessus
exploit available

Summary

GUPnP 0.12.7 allows remote attackers to cause a denial of service (crash) via an empty (1) subscription or (2) control message.

Vulnerable Configurations

Part Description Count
Application
Gupnp
1

Exploit-Db

descriptionGUPnP 0.12.7 Message Handling Denial Of Service Vulnerability. CVE-2009-2174. Dos exploit for linux platform
idEDB-ID:33040
last seen2016-02-03
modified2009-05-03
published2009-05-03
reporterZeeshan Ali
sourcehttps://www.exploit-db.com/download/33040/
titleGUPnP 0.12.7 Message Handling Denial Of Service Vulnerability

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-5865.NASL
    descriptionNew upstream release that fixes a bug where the gupnp stack crashes when passed empty content ChangeLog here http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NE WS&id=ce714a6700ce03953a2886a66ec57db59205f4e6 Bug report here http://bugzilla.openedhand.com/show_bug.cgi?id=1604 Other bugs fixed here. - bug#1570: gupnp doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id39396
    published2009-06-16
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/39396
    titleFedora 11 : gupnp-0.12.8-1.fc11 (2009-5865)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2009-5865.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(39396);
      script_version ("1.10");
      script_cvs_date("Date: 2019/08/02 13:32:30");
    
      script_cve_id("CVE-2009-2174");
      script_xref(name:"FEDORA", value:"2009-5865");
    
      script_name(english:"Fedora 11 : gupnp-0.12.8-1.fc11 (2009-5865)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "New upstream release that fixes a bug where the gupnp stack crashes
    when passed empty content ChangeLog here
    http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NE
    WS&id=ce714a6700ce03953a2886a66ec57db59205f4e6 Bug report here
    http://bugzilla.openedhand.com/show_bug.cgi?id=1604 Other bugs fixed
    here. - bug#1570: gupnp doesn't set the pkgconfig lib dir correctly in
    64 bit env. - bug#1574: Avoid using asserts. - bug#1592:
    gupnp_device_info_get_icon_url() does not return the closest match. -
    bug#1604: Crash on action without any content.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://bugzilla.openedhand.com/show_bug.cgi?id=1604"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NE"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2009-June/024875.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?95b52442"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected gupnp package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:gupnp");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:11");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2009/06/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/06/16");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^11([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 11.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC11", reference:"gupnp-0.12.8-1.fc11")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gupnp");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-5861.NASL
    descriptionNew upstream release that fixes a bug where the gupnp stack crashes when passed empty content ChangeLog here http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NE WS&id=ce714a6700ce03953a2886a66ec57db59205f4e6 Bug report here http://bugzilla.openedhand.com/show_bug.cgi?id=1604 Other bugs fixed here. - bug#1570: gupnp doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id39395
    published2009-06-16
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/39395
    titleFedora 10 : gupnp-0.12.8-1.fc10 (2009-5861)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2009-5861.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(39395);
      script_version ("1.10");
      script_cvs_date("Date: 2019/08/02 13:32:30");
    
      script_cve_id("CVE-2009-2174");
      script_xref(name:"FEDORA", value:"2009-5861");
    
      script_name(english:"Fedora 10 : gupnp-0.12.8-1.fc10 (2009-5861)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "New upstream release that fixes a bug where the gupnp stack crashes
    when passed empty content ChangeLog here
    http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NE
    WS&id=ce714a6700ce03953a2886a66ec57db59205f4e6 Bug report here
    http://bugzilla.openedhand.com/show_bug.cgi?id=1604 Other bugs fixed
    here. - bug#1570: gupnp doesn't set the pkgconfig lib dir correctly in
    64 bit env. - bug#1574: Avoid using asserts. - bug#1592:
    gupnp_device_info_get_icon_url() does not return the closest match. -
    bug#1604: Crash on action without any content.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://bugzilla.openedhand.com/show_bug.cgi?id=1604"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NE"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2009-June/024988.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?3e6ed12d"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected gupnp package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:gupnp");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:10");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2009/06/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/06/16");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^10([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 10.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC10", reference:"gupnp-0.12.8-1.fc10")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gupnp");
    }