Input validation error in gSOAP - CVE-2017-9765
Published: July 20, 2017 / Updated: July 28, 2020
gSOAP
Detailed vulnerability description
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy.
How to mitigate CVE-2017-9765
Sources
- http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions
- http://blog.senr.io/devilsivy.html
- http://www.securityfocus.com/bid/99868
- https://bugzilla.redhat.com/show_bug.cgi?id=1472807
- https://bugzilla.suse.com/show_bug.cgi?id=1049348
- https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_%28June_21,_2017%29
- https://www.genivia.com/changelog.html#Version_2.8.48_upd_%2806/21/2017%29