
CVE-2024-52531 – libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict
https://notcve.org/view.php?id=CVE-2024-52531
11 Nov 2024 — GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this. GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response). ... • https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVE-2019-17266 – Ubuntu Security Notice USN-4152-1
https://notcve.org/view.php?id=CVE-2019-17266
06 Oct 2019 — libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy. libsoup desde las versiones 2.65.1 hasta 2.68.1 presenta una lectura excesiva de búfer en la región heap de la memoria porque la función soup_ntlm_parse_challenge() en el archivo soup-auth-ntlm.c no comprueba apropiadamente la longitud de un mensaje NTLM antes del procesamiento con una memcpy. It... • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912 • CWE-125: Out-of-bounds Read •

CVE-2018-12910 – libsoup: Crash in soup_cookie_jar.c:get_cookies() on empty hostnames
https://notcve.org/view.php?id=CVE-2018-12910
03 Jul 2018 — The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname. La función get_cookies en soup-cookie-jar.c en libsoup 2.63.2 permite que los atacantes provoquen un impacto no especificado mediante un nombre de host vacío. An out-of-bounds read has been discovered in libsoup when getting cookies from a URI with empty hostname. An attacker may use this flaw to cause a crash in the application. GNOME is the default desktop environment of Red H... • http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html • CWE-125: Out-of-bounds Read •

CVE-2018-11713 – webkitgtk: WebSockets don't use system proxy settings
https://notcve.org/view.php?id=CVE-2018-11713
04 Jun 2018 — WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection. WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp en el backend de red de WebKit, tal y como se emplea en WebKitGTK+ en versiones anteriores a la 2.20.0 o sin ... • https://bugs.webkit.org/show_bug.cgi?id=126384 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2017-2885 – libsoup: Stack based buffer overflow with HTTP Chunked Encoding
https://notcve.org/view.php?id=CVE-2017-2885
10 Aug 2017 — An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability. Existe una vulnerabilidad explotable de desbordamiento de búfer basado en pila en GNOME libsoup 2.58. Una petición HTTP especialmente manipulada puede provocar un desbordamiento de pila que daría lugar a la ejecución remota d... • https://packetstorm.news/files/id/160388 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVE-2012-2132
https://notcve.org/view.php?id=CVE-2012-2132
20 Aug 2012 — libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection. libsoup v2.32.2 y anteriores no valida los certificados o elimina el indicador de 'confiable' cuando el archivo ssl-ca-file no existe, lo que permite a atacantes remotos evitar la autenticación mediante el uso de una conexión SSL. • http://www.openwall.com/lists/oss-security/2012/04/24/13 • CWE-287: Improper Authentication •

CVE-2011-2524 – libsoup: SoupServer directory traversal flaw
https://notcve.org/view.php?id=CVE-2011-2524
31 Aug 2011 — Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI. Una vulnerabilidad de salto de directorio en la soup-uri.c en SoupServer en libsoup antes de v2.35.4 permite a atacantes remotos leer archivos de su elección a través de un %2e%2e (punto punto) en la URI. This GLSA contains notification of vulnerabilities found in several Gentoo packages which have been fixed prior to January 1, 2012.... • http://git.gnome.org/browse/libsoup/tree/NEWS • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •