Buffer overflow in Opensuse - CVE-2014-3985
Published: September 11, 2014 / Updated: August 10, 2020
Vulnerability identifier: #VU41338
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2014-3985
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: SUSE
Affected software:
Opensuse
Opensuse
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The getHTTPResponse function in miniwget.c in MiniUPnP 1.9 allows remote attackers to cause a denial of service (crash) via crafted headers that trigger an out-of-bounds read.
How to mitigate CVE-2014-3985
Install update from vendor's website.
Sources
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00039.html
- http://seclists.org/oss-sec/2014/q2/201
- http://seclists.org/oss-sec/2014/q2/496
- http://www.securityfocus.com/bid/67152
- https://bugzilla.redhat.com/show_bug.cgi?id=1085618
- https://github.com/miniupnp/miniupnp/commit/3a87aa2f10bd7f1408e1849bdb59c41dd63a9fe9
- https://security.gentoo.org/glsa/201701-41