All the vulnerabilites related to GNOME - libsoup
cve-2018-12910
Vulnerability from cvelistv5
Published
2018-07-05 18:00
Modified
2024-08-05 08:45
Severity ?
Summary
The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T08:45:02.430Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2018-fb2afee474",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/3"
          },
          {
            "name": "RHSA-2018:3505",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2018:3505"
          },
          {
            "name": "DSA-4241",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4241"
          },
          {
            "name": "[debian-lts-announce] 20180706 [SECURITY] [DLA 1416-1] libsoup2.4 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html"
          },
          {
            "name": "USN-3701-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3701-1/"
          },
          {
            "name": "RHSA-2018:3140",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2018:3140"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f"
          },
          {
            "name": "RHBA-2019:0327",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHBA-2019:0327"
          },
          {
            "name": "openSUSE-SU-2019:1310",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-06-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-05-02T23:06:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2018-fb2afee474",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/3"
        },
        {
          "name": "RHSA-2018:3505",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2018:3505"
        },
        {
          "name": "DSA-4241",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4241"
        },
        {
          "name": "[debian-lts-announce] 20180706 [SECURITY] [DLA 1416-1] libsoup2.4 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html"
        },
        {
          "name": "USN-3701-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3701-1/"
        },
        {
          "name": "RHSA-2018:3140",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2018:3140"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f"
        },
        {
          "name": "RHBA-2019:0327",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHBA-2019:0327"
        },
        {
          "name": "openSUSE-SU-2019:1310",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-12910",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2018-fb2afee474",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/"
            },
            {
              "name": "https://gitlab.gnome.org/GNOME/libsoup/issues/3",
              "refsource": "CONFIRM",
              "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/3"
            },
            {
              "name": "RHSA-2018:3505",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2018:3505"
            },
            {
              "name": "DSA-4241",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4241"
            },
            {
              "name": "[debian-lts-announce] 20180706 [SECURITY] [DLA 1416-1] libsoup2.4 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html"
            },
            {
              "name": "USN-3701-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3701-1/"
            },
            {
              "name": "RHSA-2018:3140",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2018:3140"
            },
            {
              "name": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047",
              "refsource": "CONFIRM",
              "url": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047"
            },
            {
              "name": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f",
              "refsource": "CONFIRM",
              "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f"
            },
            {
              "name": "RHBA-2019:0327",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHBA-2019:0327"
            },
            {
              "name": "openSUSE-SU-2019:1310",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-12910",
    "datePublished": "2018-07-05T18:00:00",
    "dateReserved": "2018-06-27T00:00:00",
    "dateUpdated": "2024-08-05T08:45:02.430Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-11713
Vulnerability from cvelistv5
Published
2018-06-04 14:00
Modified
2024-08-05 08:17
Severity ?
Summary
WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T08:17:08.955Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://trac.webkit.org/changeset/228088/webkit"
          },
          {
            "name": "GLSA-201808-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201808-04"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.webkit.org/show_bug.cgi?id=126384"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-06-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-21T09:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://trac.webkit.org/changeset/228088/webkit"
        },
        {
          "name": "GLSA-201808-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201808-04"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.webkit.org/show_bug.cgi?id=126384"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-11713",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://trac.webkit.org/changeset/228088/webkit",
              "refsource": "MISC",
              "url": "https://trac.webkit.org/changeset/228088/webkit"
            },
            {
              "name": "GLSA-201808-04",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201808-04"
            },
            {
              "name": "https://bugs.webkit.org/show_bug.cgi?id=126384",
              "refsource": "MISC",
              "url": "https://bugs.webkit.org/show_bug.cgi?id=126384"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-11713",
    "datePublished": "2018-06-04T14:00:00",
    "dateReserved": "2018-06-04T00:00:00",
    "dateUpdated": "2024-08-05T08:17:08.955Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-2885
Vulnerability from cvelistv5
Published
2018-04-24 19:00
Modified
2024-09-17 03:32
Severity ?
Summary
An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:09:17.443Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2017:2459",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:2459"
          },
          {
            "name": "DSA-3929",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2017/dsa-3929"
          },
          {
            "name": "100258",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/100258"
          },
          {
            "name": "20201204 ProCaster LE-32F430 SmartTV RCE via libsoup/2.51.3 stack overflow (CVE-2017-2885)",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2020/Dec/3"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "libsoup",
          "vendor": "GNOME",
          "versions": [
            {
              "status": "affected",
              "version": "2.58"
            }
          ]
        }
      ],
      "datePublic": "2017-08-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "buffer overflow",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-19T18:24:10",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "name": "RHSA-2017:2459",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:2459"
        },
        {
          "name": "DSA-3929",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2017/dsa-3929"
        },
        {
          "name": "100258",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/100258"
        },
        {
          "name": "20201204 ProCaster LE-32F430 SmartTV RCE via libsoup/2.51.3 stack overflow (CVE-2017-2885)",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2020/Dec/3"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "talos-cna@cisco.com",
          "DATE_PUBLIC": "2017-08-10T00:00:00",
          "ID": "CVE-2017-2885",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "libsoup",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.58"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "GNOME"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability."
            }
          ]
        },
        "impact": {
          "cvss": {
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "buffer overflow"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2017:2459",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:2459"
            },
            {
              "name": "DSA-3929",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2017/dsa-3929"
            },
            {
              "name": "100258",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/100258"
            },
            {
              "name": "20201204 ProCaster LE-32F430 SmartTV RCE via libsoup/2.51.3 stack overflow (CVE-2017-2885)",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2020/Dec/3"
            },
            {
              "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392",
              "refsource": "MISC",
              "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392"
            },
            {
              "name": "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2017-2885",
    "datePublished": "2018-04-24T19:00:00Z",
    "dateReserved": "2016-12-01T00:00:00",
    "dateUpdated": "2024-09-17T03:32:40.423Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2132
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-08-06 19:26
Severity ?
Summary
libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:26:08.201Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120424 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/04/24/13"
          },
          {
            "name": "53232",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53232"
          },
          {
            "name": "[oss-security] 20120424 CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/04/24/3"
          },
          {
            "name": "[oss-security] 20120430 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/04/30/7"
          },
          {
            "name": "libsoup-ssl-poofing(75167)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167"
          },
          {
            "name": "[oss-security] 20120502 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/02/8"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=666280"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20120424 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/04/24/13"
        },
        {
          "name": "53232",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53232"
        },
        {
          "name": "[oss-security] 20120424 CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/04/24/3"
        },
        {
          "name": "[oss-security] 20120430 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/04/30/7"
        },
        {
          "name": "libsoup-ssl-poofing(75167)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167"
        },
        {
          "name": "[oss-security] 20120502 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/02/8"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=666280"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2132",
    "datePublished": "2012-08-20T18:00:00",
    "dateReserved": "2012-04-04T00:00:00",
    "dateUpdated": "2024-08-06T19:26:08.201Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-17266
Vulnerability from cvelistv5
Published
2019-10-06 21:48
Modified
2024-08-05 01:33
Severity ?
Summary
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:33:17.352Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/173"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2019-17266"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad"
          },
          {
            "name": "USN-4152-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4152-1/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message\u0027s length before proceeding with a memcpy."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-09T20:06:08",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/173"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security-tracker.debian.org/tracker/CVE-2019-17266"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad"
        },
        {
          "name": "USN-4152-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4152-1/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-17266",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message\u0027s length before proceeding with a memcpy."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.gnome.org/GNOME/libsoup/issues/173",
              "refsource": "MISC",
              "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/173"
            },
            {
              "name": "https://security-tracker.debian.org/tracker/CVE-2019-17266",
              "refsource": "MISC",
              "url": "https://security-tracker.debian.org/tracker/CVE-2019-17266"
            },
            {
              "name": "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab",
              "refsource": "MISC",
              "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab"
            },
            {
              "name": "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md",
              "refsource": "MISC",
              "url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md"
            },
            {
              "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912",
              "refsource": "MISC",
              "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912"
            },
            {
              "name": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1705054.html",
              "refsource": "MISC",
              "url": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1705054.html"
            },
            {
              "name": "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad",
              "refsource": "MISC",
              "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad"
            },
            {
              "name": "USN-4152-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4152-1/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-17266",
    "datePublished": "2019-10-06T21:48:18",
    "dateReserved": "2019-10-06T00:00:00",
    "dateUpdated": "2024-08-05T01:33:17.352Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-2524
Vulnerability from cvelistv5
Published
2011-08-31 23:00
Modified
2024-08-06 23:00
Severity ?
Summary
Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.
References
http://secunia.com/advisories/47299third-party-advisory, x_refsource_SECUNIA
http://git.gnome.org/browse/libsoup/tree/NEWSx_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.htmlvendor-advisory, x_refsource_FEDORA
http://www.redhat.com/support/errata/RHSA-2011-1102.htmlvendor-advisory, x_refsource_REDHAT
http://www.securitytracker.com/id?1025864vdb-entry, x_refsource_SECTRACK
http://www.debian.org/security/2011/dsa-2369vendor-advisory, x_refsource_DEBIAN
https://bugzilla.gnome.org/show_bug.cgi?id=653258x_refsource_MISC
http://www.ubuntu.com/usn/USN-1181-1vendor-advisory, x_refsource_UBUNTU
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:00:34.115Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "47299",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47299"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/libsoup/tree/NEWS"
          },
          {
            "name": "FEDORA-2011-9763",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html"
          },
          {
            "name": "RHSA-2011:1102",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-1102.html"
          },
          {
            "name": "1025864",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025864"
          },
          {
            "name": "DSA-2369",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2369"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.gnome.org/show_bug.cgi?id=653258"
          },
          {
            "name": "USN-1181-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1181-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-07-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-01-19T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "47299",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47299"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/libsoup/tree/NEWS"
        },
        {
          "name": "FEDORA-2011-9763",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html"
        },
        {
          "name": "RHSA-2011:1102",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-1102.html"
        },
        {
          "name": "1025864",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025864"
        },
        {
          "name": "DSA-2369",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2369"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.gnome.org/show_bug.cgi?id=653258"
        },
        {
          "name": "USN-1181-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1181-1"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2524",
    "datePublished": "2011-08-31T23:00:00",
    "dateReserved": "2011-06-15T00:00:00",
    "dateUpdated": "2024-08-06T23:00:34.115Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2018-06-04 14:29
Modified
2024-11-21 03:43
Summary
WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.
Impacted products
Vendor Product Version
webkitgtk webkitgtk\+ *
gnome libsoup *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65C019E7-FCF0-4D07-8027-E88E8C38BACE",
              "versionEndExcluding": "2.20.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "036A3669-4E94-4183-889D-3C2DFBFA72BD",
              "versionEndExcluding": "2.62.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection."
    },
    {
      "lang": "es",
      "value": "WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp en el backend de red de WebKit, tal y como se emplea en WebKitGTK+ en versiones anteriores a la 2.20.0 o sin libsoup 2.62.0, fall\u00f3 inesperadamente a la hora de emplear las opciones de proxy del sistema para las conexiones WebSocket. Como resultado, los usuarios pueden perder su anonimato mediante sitios web manipulados a los que se accede a trav\u00e9s de una conexi\u00f3n WebSocket."
    }
  ],
  "id": "CVE-2018-11713",
  "lastModified": "2024-11-21T03:43:52.770",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-06-04T14:29:00.453",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugs.webkit.org/show_bug.cgi?id=126384"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/201808-04"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://trac.webkit.org/changeset/228088/webkit"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugs.webkit.org/show_bug.cgi?id=126384"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201808-04"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://trac.webkit.org/changeset/228088/webkit"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-07-05 18:29
Modified
2024-11-21 03:46
Severity ?
Summary
The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://access.redhat.com/errata/RHBA-2019:0327Third Party Advisory
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2018:3140Third Party Advisory
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2018:3505Third Party Advisory
cve@mitre.orghttps://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047Patch, Third Party Advisory
cve@mitre.orghttps://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439fPatch, Third Party Advisory, Vendor Advisory
cve@mitre.orghttps://gitlab.gnome.org/GNOME/libsoup/issues/3Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2018/07/msg00007.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/
cve@mitre.orghttps://usn.ubuntu.com/3701-1/Third Party Advisory
cve@mitre.orghttps://www.debian.org/security/2018/dsa-4241Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHBA-2019:0327Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:3140Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:3505Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439fPatch, Third Party Advisory, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.gnome.org/GNOME/libsoup/issues/3Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2018/07/msg00007.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3701-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2018/dsa-4241Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEB94C1-04C2-4A43-A95F-BB8EDF707DB2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5319543-0143-4E2E-AA77-B7F116C1336C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n get_cookies en soup-cookie-jar.c en libsoup 2.63.2 permite que los atacantes provoquen un impacto no especificado mediante un nombre de host vac\u00edo."
    }
  ],
  "id": "CVE-2018-12910",
  "lastModified": "2024-11-21T03:46:05.220",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-07-05T18:29:00.423",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHBA-2019:0327"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2018:3140"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2018:3505"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3701-1/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHBA-2019:0327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2018:3140"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2018:3505"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3701-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4241"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-08-31 23:55
Modified
2024-11-21 01:28
Severity ?
Summary
Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.
Impacted products
Vendor Product Version
gnome libsoup *
gnome libsoup 2.0
gnome libsoup 2.2
gnome libsoup 2.2.0
gnome libsoup 2.2.1
gnome libsoup 2.2.2
gnome libsoup 2.2.3
gnome libsoup 2.2.4
gnome libsoup 2.2.5
gnome libsoup 2.2.6
gnome libsoup 2.2.6.1
gnome libsoup 2.2.7
gnome libsoup 2.2.91
gnome libsoup 2.2.92
gnome libsoup 2.2.93
gnome libsoup 2.2.94
gnome libsoup 2.2.95.1
gnome libsoup 2.2.96
gnome libsoup 2.2.97
gnome libsoup 2.2.98
gnome libsoup 2.2.99
gnome libsoup 2.2.100
gnome libsoup 2.2.101
gnome libsoup 2.2.102
gnome libsoup 2.2.103
gnome libsoup 2.2.104
gnome libsoup 2.3.0.1
gnome libsoup 2.3.2
gnome libsoup 2.3.4
gnome libsoup 2.4.0
gnome libsoup 2.4.1
gnome libsoup 2.23.1
gnome libsoup 2.23.6
gnome libsoup 2.23.91
gnome libsoup 2.23.92
gnome libsoup 2.24.0.1
gnome libsoup 2.24.1
gnome libsoup 2.25.2
gnome libsoup 2.25.3
gnome libsoup 2.25.4
gnome libsoup 2.25.5
gnome libsoup 2.25.91
gnome libsoup 2.26.0
gnome libsoup 2.26.1
gnome libsoup 2.27.1
gnome libsoup 2.27.2
gnome libsoup 2.27.4
gnome libsoup 2.27.5
gnome libsoup 2.27.90
gnome libsoup 2.27.91
gnome libsoup 2.27.92
gnome libsoup 2.28.0
gnome libsoup 2.28.1
gnome libsoup 2.29.3
gnome libsoup 2.29.5
gnome libsoup 2.29.6
gnome libsoup 2.29.90
gnome libsoup 2.29.91
gnome libsoup 2.30.0
gnome libsoup 2.30.1
gnome libsoup 2.31.2
gnome libsoup 2.31.6
gnome libsoup 2.31.90
gnome libsoup 2.31.92
gnome libsoup 2.32.0
gnome libsoup 2.32.1
gnome libsoup 2.32.2
gnome libsoup 2.33.4
gnome libsoup 2.33.5
gnome libsoup 2.33.6
gnome libsoup 2.33.90
gnome libsoup 2.33.92
gnome libsoup 2.34.0
gnome libsoup 2.34.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C5DD5AB-8CB2-4B2E-AE93-3754085845ED",
              "versionEndIncluding": "2.35.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EFB489-06D8-402D-8470-38551BCB2FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1C82429-BB29-49E7-ADFA-EED16ED7AFC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B9D7017-F606-4466-8F9A-817C6862AD95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3619C616-7DAB-4035-9D23-2F2336954DBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E672080A-06D2-4C2C-B3D1-BE679D5649BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1B4616-3889-41B6-870F-37DC78A153FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E1E613A-B333-4E96-90BA-A2AD4363DEB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EEDB4A8-5593-47C3-92F3-F91476C0D4F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD001D38-16AB-4AFB-9DC6-F7A340436E2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5398E1-3FB1-4BEA-9278-F9C041A34BD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C03F3575-9B90-419C-A5A5-5535F537F096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "467EDDA7-DA81-4DC5-815F-9D1B394CB02F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "63FE3D88-0596-479B-8E38-E47C7FA04397",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF7DEA94-7E9C-457B-B095-66CC23E9681F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F806A86-1250-49EE-992A-09574191D087",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.95.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E72DA717-D352-4DCB-BBF9-231284B945F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "19FD71C4-0D7E-4E32-ABFB-35D2943AFC5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE675A3-B03B-4417-8671-F289604C2291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AE3AD41-FAEA-41CE-8317-89E76BE9FE68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD23A95-C65E-4C2E-BAAC-0D8364A1DBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.100:*:*:*:*:*:*:*",
              "matchCriteriaId": "969CB6C0-AD9B-4F48-B77A-0BE3F56B0B22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.101:*:*:*:*:*:*:*",
              "matchCriteriaId": "95B2D824-7560-4779-A844-07D86C2CCAAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCC06A9-A79D-4CB2-ADCD-AC1987E2790B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.103:*:*:*:*:*:*:*",
              "matchCriteriaId": "25DE1614-7F35-4484-BE88-F9C4D9935EC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.2.104:*:*:*:*:*:*:*",
              "matchCriteriaId": "1756B5C1-18E1-4C6D-89AD-17432B29EBB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EA54CB-F7C9-4B17-9118-BA335B9E8D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C43A424-B38A-4819-AFC3-3532C447DF9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C994C81-6B80-47E8-AD70-B2DC7BF12209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC08FAE6-B41F-41B8-B819-F582DBEA918A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D6E08FA-E647-42B7-A033-806DAC1F4951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2752C2FA-7627-4488-88A5-5E6F76FC8F3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.23.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4AE3DE-5379-47A0-9BDC-AB49323F85C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.23.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "896575A0-8B7B-43BE-A653-0BEF54E3049B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.23.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "A02CCE6B-C774-4D9C-AD88-69D24651E1F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.24.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9299BB6F-DF57-427C-A0D0-7F872810420B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB94071-AB85-412E-A31B-29FD8189484D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.25.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC56735-58B1-4780-ABA9-32501C24B56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.25.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "72B7C474-9C79-4C1F-B0A3-A5780F87379A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.25.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF3B6CBD-5F44-4FC6-83B7-41134055D1AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.25.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "832089BA-670E-40E1-A812-164F13FE29C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.25.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C76B162-8BCC-43A9-A00B-BEDC16F02C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.26.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "42B5A587-2F23-42CB-BE0F-1F5A4E96AD06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C713940D-24D7-429F-B961-E3E1651F30C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.27.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C537C96-A138-4D5D-A657-E04D3E2B04AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.27.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C5EFE4E-ED20-4CB2-B0DE-D7A726F26221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.27.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "99340F6B-F033-497F-AD66-655504495CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.27.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFE407F-7F02-4E08-9242-41E51A436F1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.27.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "A838EB16-BC34-4747-84E6-FD31718BC708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.27.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6F6369-34FD-47D2-A829-BB36CBAAA99A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.27.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "054A96BA-6584-4D6B-AEB5-FE12209E5C69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.28.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FAB459F-29F5-4AD9-95F4-95F5D05FE91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.28.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FFD7530-6548-4A91-9A0A-F80429368E4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.29.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B48661A-D82E-49D7-917C-3D6A3A7CE116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.29.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA0FA486-3657-48DC-9E10-11EE8A1458B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.29.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F7CFA6-628D-4CF5-93EB-55519CF955EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.29.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1878C5-80C7-4DC2-987C-1BC52E63A8C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.29.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D7E6439-AC14-4D45-BC73-C0BF7E79BE9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.30.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2E158D5-987A-4F93-82A0-CF74527CA210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.30.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE0D94D2-D74A-448F-9DF5-4B4C23138E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.31.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D363498-6F1D-4EEF-853D-905F1D95E62D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.31.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "981AF805-9646-4913-B274-1969AFACC734",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.31.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1197161-E084-4485-BA72-B60C07469680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.31.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E91156-537E-4885-87C2-EC4BA8C2B306",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.32.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9130A56A-2995-455A-8A51-1A0A85F3D38E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.32.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3A81CD2-1192-4F9E-8BF4-BF86445E11AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.32.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "92398648-8754-4130-BA90-A54838AFA159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.33.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C536F346-4B27-4A53-A942-68531D9991A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.33.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F602177-543B-4A42-92C1-53F1573518FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.33.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8011A42F-B7EF-44F2-BE9A-E2543EB1C808",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.33.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC3501F1-B153-4870-A7A4-741ACA848656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.33.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "398B638B-9879-403D-9F55-59FCC8CE3F31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.34.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A16CBF8D-7411-4E16-81B0-47696F036C35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.34.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AC22BA2-D63A-48F8-BF0F-90D664EA6856",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de salto de directorio en la soup-uri.c en SoupServer en libsoup antes de v2.35.4 permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de un %2e%2e (punto punto) en la URI."
    }
  ],
  "id": "CVE-2011-2524",
  "lastModified": "2024-11-21T01:28:27.667",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-08-31T23:55:02.957",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.gnome.org/browse/libsoup/tree/NEWS"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/47299"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2011/dsa-2369"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1102.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1025864"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1181-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=653258"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.gnome.org/browse/libsoup/tree/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/47299"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2369"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1102.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025864"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1181-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=653258"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-10-06 22:15
Modified
2024-11-21 04:31
Severity ?
Summary
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
References
cve@mitre.orghttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912Third Party Advisory
cve@mitre.orghttps://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.mdThird Party Advisory
cve@mitre.orghttps://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05abThird Party Advisory
cve@mitre.orghttps://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266adThird Party Advisory
cve@mitre.orghttps://gitlab.gnome.org/GNOME/libsoup/issues/173Broken Link, Issue Tracking, Third Party Advisory
cve@mitre.orghttps://security-tracker.debian.org/tracker/CVE-2019-17266Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/4152-1/Third Party Advisory
cve@mitre.orghttps://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html
af854a3a-2127-422b-91ae-364da2661108https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.mdThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05abThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266adThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.gnome.org/GNOME/libsoup/issues/173Broken Link, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security-tracker.debian.org/tracker/CVE-2019-17266Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4152-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html
Impacted products
Vendor Product Version
gnome libsoup *
gnome libsoup *
canonical ubuntu_linux 18.04
canonical ubuntu_linux 19.04



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82D58806-8762-4FD9-9658-6C4809D1E432",
              "versionEndExcluding": "2.66.4",
              "versionStartIncluding": "2.65.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73D27E8B-ABB1-436E-85B8-A692C8237393",
              "versionEndIncluding": "2.68.1",
              "versionStartIncluding": "2.67.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message\u0027s length before proceeding with a memcpy."
    },
    {
      "lang": "es",
      "value": "libsoup desde las versiones 2.65.1 hasta 2.68.1 presenta una lectura excesiva de b\u00fafer en la regi\u00f3n heap de la memoria porque la funci\u00f3n soup_ntlm_parse_challenge() en el archivo soup-auth-ntlm.c no comprueba apropiadamente la longitud de un mensaje NTLM antes del procesamiento con una memcpy."
    }
  ],
  "id": "CVE-2019-17266",
  "lastModified": "2024-11-21T04:31:59.397",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-10-06T22:15:10.367",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/173"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2019-17266"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4152-1/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/173"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2019-17266"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4152-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:38
Severity ?
Summary
libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.
Impacted products
Vendor Product Version
gnome libsoup 2.32.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.32.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "92398648-8754-4130-BA90-A54838AFA159",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection."
    },
    {
      "lang": "es",
      "value": "libsoup v2.32.2 y anteriores no valida los certificados o elimina el indicador de \u0027confiable\u0027 cuando el archivo ssl-ca-file no existe, lo que permite a atacantes remotos evitar la autenticaci\u00f3n mediante el uso de una conexi\u00f3n SSL.\r\n"
    }
  ],
  "id": "CVE-2012-2132",
  "lastModified": "2024-11-21T01:38:33.933",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-20T18:55:03.043",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/04/24/13"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/04/24/3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/04/30/7"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/02/8"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/53232"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=666280"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/04/24/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/04/24/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/04/30/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/02/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.gnome.org/show_bug.cgi?id=666280"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-04-24 19:29
Modified
2024-11-21 03:24
Severity ?
Summary
An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:libsoup:2.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BD5FB77-9583-4CFE-858A-774344AE8222",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad explotable de desbordamiento de b\u00fafer basado en pila en GNOME libsoup 2.58. Una petici\u00f3n HTTP especialmente manipulada puede provocar un desbordamiento de pila que dar\u00eda lugar a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede enviar una petici\u00f3n HTTP especial al servidor vulnerable para desencadenar esta vulnerabilidad."
    }
  ],
  "id": "CVE-2017-2885",
  "lastModified": "2024-11-21T03:24:23.510",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "talos-cna@cisco.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-24T19:29:02.783",
  "references": [
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2020/Dec/3"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.securityfocus.com/bid/100258"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2459"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2017/dsa-3929"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Exploit",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2020/Dec/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.securityfocus.com/bid/100258"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2017/dsa-3929"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392"
    }
  ],
  "sourceIdentifier": "talos-cna@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}