// For flags

CVE-2012-5961

Portable UPnP SDK - 'unique_service_name()' Remote Code Execution

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1 allows remote attackers to execute arbitrary code via a long UDN (aka device) field in a UDP packet.

Desbordamiento de búfer basado en pila en la función de unique_service_name en ssdp/ssdp_server.c en el analizador SSDP en el SDK portátil para dispositivos UPnP (alias libupnp, anteriormente el SDK Intel para dispositivos UPnP) v1.3.1 que permite a atacantes remotos ejecutar código arbitrario a través de un campo long UDN (alias dispositivo) de un paquete UDP.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-11-21 CVE Reserved
  • 2013-01-31 CVE Published
  • 2013-02-05 First Exploit
  • 2024-08-06 CVE Updated
  • 2024-10-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (16)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Libupnp Project
Search vendor "Libupnp Project"
Libupnp
Search vendor "Libupnp Project" for product "Libupnp"
1.3.1
Search vendor "Libupnp Project" for product "Libupnp" and version "1.3.1"
-
Affected