SB2020060424 - NULL pointer dereference in pupnp.sourceforge.net libupnp
Published: June 4, 2020 Updated: July 28, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2020-13848)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00033.html
- https://github.com/pupnp/pupnp/commit/c805c1de1141cb22f74c0d94dd5664bda37398e0
- https://github.com/pupnp/pupnp/issues/177
- https://lists.debian.org/debian-lts-announce/2020/06/msg00006.html