NULL pointer dereference in libupnp - CVE-2020-13848
Published: June 4, 2020 / Updated: July 28, 2020
libupnp
pupnp.sourceforge.net
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
Remediation
External links
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00033.html
- https://github.com/pupnp/pupnp/commit/c805c1de1141cb22f74c0d94dd5664bda37398e0
- https://github.com/pupnp/pupnp/issues/177
- https://lists.debian.org/debian-lts-announce/2020/06/msg00006.html