Vulnerabilities > CVE-2009-2174 - Denial Of Service vulnerability in Gupnp 0.12.7
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
GUPnP 0.12.7 allows remote attackers to cause a denial of service (crash) via an empty (1) subscription or (2) control message.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | GUPnP 0.12.7 Message Handling Denial Of Service Vulnerability. CVE-2009-2174. Dos exploit for linux platform |
id | EDB-ID:33040 |
last seen | 2016-02-03 |
modified | 2009-05-03 |
published | 2009-05-03 |
reporter | Zeeshan Ali |
source | https://www.exploit-db.com/download/33040/ |
title | GUPnP 0.12.7 Message Handling Denial Of Service Vulnerability |
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2009-5865.NASL description New upstream release that fixes a bug where the gupnp stack crashes when passed empty content ChangeLog here http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NE WS&id=ce714a6700ce03953a2886a66ec57db59205f4e6 Bug report here http://bugzilla.openedhand.com/show_bug.cgi?id=1604 Other bugs fixed here. - bug#1570: gupnp doesn last seen 2020-06-01 modified 2020-06-02 plugin id 39396 published 2009-06-16 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/39396 title Fedora 11 : gupnp-0.12.8-1.fc11 (2009-5865) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2009-5865. # include("compat.inc"); if (description) { script_id(39396); script_version ("1.10"); script_cvs_date("Date: 2019/08/02 13:32:30"); script_cve_id("CVE-2009-2174"); script_xref(name:"FEDORA", value:"2009-5865"); script_name(english:"Fedora 11 : gupnp-0.12.8-1.fc11 (2009-5865)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "New upstream release that fixes a bug where the gupnp stack crashes when passed empty content ChangeLog here http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NE WS&id=ce714a6700ce03953a2886a66ec57db59205f4e6 Bug report here http://bugzilla.openedhand.com/show_bug.cgi?id=1604 Other bugs fixed here. - bug#1570: gupnp doesn't set the pkgconfig lib dir correctly in 64 bit env. - bug#1574: Avoid using asserts. - bug#1592: gupnp_device_info_get_icon_url() does not return the closest match. - bug#1604: Crash on action without any content. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"http://bugzilla.openedhand.com/show_bug.cgi?id=1604" ); script_set_attribute( attribute:"see_also", value:"http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NE" ); # https://lists.fedoraproject.org/pipermail/package-announce/2009-June/024875.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?95b52442" ); script_set_attribute(attribute:"solution", value:"Update the affected gupnp package."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:gupnp"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:11"); script_set_attribute(attribute:"patch_publication_date", value:"2009/06/04"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/06/16"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^11([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 11.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC11", reference:"gupnp-0.12.8-1.fc11")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gupnp"); }
NASL family Fedora Local Security Checks NASL id FEDORA_2009-5861.NASL description New upstream release that fixes a bug where the gupnp stack crashes when passed empty content ChangeLog here http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NE WS&id=ce714a6700ce03953a2886a66ec57db59205f4e6 Bug report here http://bugzilla.openedhand.com/show_bug.cgi?id=1604 Other bugs fixed here. - bug#1570: gupnp doesn last seen 2020-06-01 modified 2020-06-02 plugin id 39395 published 2009-06-16 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/39395 title Fedora 10 : gupnp-0.12.8-1.fc10 (2009-5861) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2009-5861. # include("compat.inc"); if (description) { script_id(39395); script_version ("1.10"); script_cvs_date("Date: 2019/08/02 13:32:30"); script_cve_id("CVE-2009-2174"); script_xref(name:"FEDORA", value:"2009-5861"); script_name(english:"Fedora 10 : gupnp-0.12.8-1.fc10 (2009-5861)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "New upstream release that fixes a bug where the gupnp stack crashes when passed empty content ChangeLog here http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NE WS&id=ce714a6700ce03953a2886a66ec57db59205f4e6 Bug report here http://bugzilla.openedhand.com/show_bug.cgi?id=1604 Other bugs fixed here. - bug#1570: gupnp doesn't set the pkgconfig lib dir correctly in 64 bit env. - bug#1574: Avoid using asserts. - bug#1592: gupnp_device_info_get_icon_url() does not return the closest match. - bug#1604: Crash on action without any content. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"http://bugzilla.openedhand.com/show_bug.cgi?id=1604" ); script_set_attribute( attribute:"see_also", value:"http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NE" ); # https://lists.fedoraproject.org/pipermail/package-announce/2009-June/024988.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?3e6ed12d" ); script_set_attribute(attribute:"solution", value:"Update the affected gupnp package."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:gupnp"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:10"); script_set_attribute(attribute:"patch_publication_date", value:"2009/06/04"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/06/16"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^10([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 10.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC10", reference:"gupnp-0.12.8-1.fc10")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gupnp"); }
References
- http://bugzilla.openedhand.com/show_bug.cgi?id=1604
- http://git.gupnp.org/cgit.cgi?url=gupnp/tree/NEWS&id=ce714a6700ce03953a2886a66ec57db59205f4e6
- http://secunia.com/advisories/35472
- http://secunia.com/advisories/35482
- http://www.osvdb.org/55128
- http://www.securityfocus.com/bid/35390
- http://www.vupen.com/english/advisories/2009/1597
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00494.html
- https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00607.html