All the vulnerabilites related to gnome - libsoup
cve-2018-12910
Vulnerability from cvelistv5
Published
2018-07-05 18:00
Modified
2024-08-05 08:45
Severity ?
EPSS score ?
Summary
The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:45:02.430Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2018-fb2afee474", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/3" }, { "name": "RHSA-2018:3505", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3505" }, { "name": "DSA-4241", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4241" }, { "name": "[debian-lts-announce] 20180706 [SECURITY] [DLA 1416-1] libsoup2.4 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html" }, { "name": "USN-3701-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3701-1/" }, { "name": "RHSA-2018:3140", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f" }, { "name": "RHBA-2019:0327", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "name": "openSUSE-SU-2019:1310", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-02T23:06:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2018-fb2afee474", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/3" }, { "name": "RHSA-2018:3505", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3505" }, { "name": "DSA-4241", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4241" }, { "name": "[debian-lts-announce] 20180706 [SECURITY] [DLA 1416-1] libsoup2.4 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html" }, { "name": "USN-3701-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3701-1/" }, { "name": "RHSA-2018:3140", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f" }, { "name": "RHBA-2019:0327", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "name": "openSUSE-SU-2019:1310", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-12910", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2018-fb2afee474", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/" }, { "name": "https://gitlab.gnome.org/GNOME/libsoup/issues/3", "refsource": "CONFIRM", "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/3" }, { "name": "RHSA-2018:3505", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3505" }, { "name": "DSA-4241", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4241" }, { "name": "[debian-lts-announce] 20180706 [SECURITY] [DLA 1416-1] libsoup2.4 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html" }, { "name": "USN-3701-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3701-1/" }, { "name": "RHSA-2018:3140", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "name": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047", "refsource": "CONFIRM", "url": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047" }, { "name": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f", "refsource": "CONFIRM", "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f" }, { "name": "RHBA-2019:0327", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "name": "openSUSE-SU-2019:1310", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-12910", "datePublished": "2018-07-05T18:00:00", "dateReserved": "2018-06-27T00:00:00", "dateUpdated": "2024-08-05T08:45:02.430Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-11713
Vulnerability from cvelistv5
Published
2018-06-04 14:00
Modified
2024-08-05 08:17
Severity ?
EPSS score ?
Summary
WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.
References
▼ | URL | Tags |
---|---|---|
https://trac.webkit.org/changeset/228088/webkit | x_refsource_MISC | |
https://security.gentoo.org/glsa/201808-04 | vendor-advisory, x_refsource_GENTOO | |
https://bugs.webkit.org/show_bug.cgi?id=126384 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:17:08.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://trac.webkit.org/changeset/228088/webkit" }, { "name": "GLSA-201808-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201808-04" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.webkit.org/show_bug.cgi?id=126384" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-06-04T00:00:00", "descriptions": [ { "lang": "en", "value": "WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-21T09:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://trac.webkit.org/changeset/228088/webkit" }, { "name": "GLSA-201808-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201808-04" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.webkit.org/show_bug.cgi?id=126384" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11713", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://trac.webkit.org/changeset/228088/webkit", "refsource": "MISC", "url": "https://trac.webkit.org/changeset/228088/webkit" }, { "name": "GLSA-201808-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201808-04" }, { "name": "https://bugs.webkit.org/show_bug.cgi?id=126384", "refsource": "MISC", "url": "https://bugs.webkit.org/show_bug.cgi?id=126384" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-11713", "datePublished": "2018-06-04T14:00:00", "dateReserved": "2018-06-04T00:00:00", "dateUpdated": "2024-08-05T08:17:08.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2885
Vulnerability from cvelistv5
Published
2018-04-24 19:00
Modified
2024-09-17 03:32
Severity ?
EPSS score ?
Summary
An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2017:2459 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2017/dsa-3929 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/100258 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2020/Dec/3 | mailing-list, x_refsource_FULLDISC | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392 | x_refsource_MISC | |
http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:09:17.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2017:2459", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2459" }, { "name": "DSA-3929", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3929" }, { "name": "100258", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100258" }, { "name": "20201204 ProCaster LE-32F430 SmartTV RCE via libsoup/2.51.3 stack overflow (CVE-2017-2885)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libsoup", "vendor": "GNOME", "versions": [ { "status": "affected", "version": "2.58" } ] } ], "datePublic": "2017-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T18:24:10", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "RHSA-2017:2459", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2459" }, { "name": "DSA-3929", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3929" }, { "name": "100258", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100258" }, { "name": "20201204 ProCaster LE-32F430 SmartTV RCE via libsoup/2.51.3 stack overflow (CVE-2017-2885)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "DATE_PUBLIC": "2017-08-10T00:00:00", "ID": "CVE-2017-2885", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libsoup", "version": { "version_data": [ { "version_value": "2.58" } ] } } ] }, "vendor_name": "GNOME" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability." } ] }, "impact": { "cvss": { "baseScore": 9.8, "baseSeverity": "Critical", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:2459", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2459" }, { "name": "DSA-3929", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3929" }, { "name": "100258", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100258" }, { "name": "20201204 ProCaster LE-32F430 SmartTV RCE via libsoup/2.51.3 stack overflow (CVE-2017-2885)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Dec/3" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392" }, { "name": "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2017-2885", "datePublished": "2018-04-24T19:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-17T03:32:40.423Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2132
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-08-06 19:26
Severity ?
EPSS score ?
Summary
libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/04/24/13 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/53232 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2012/04/24/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2012/04/30/7 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75167 | vdb-entry, x_refsource_XF | |
http://www.openwall.com/lists/oss-security/2012/05/02/8 | mailing-list, x_refsource_MLIST | |
https://bugzilla.gnome.org/show_bug.cgi?id=666280 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:26:08.201Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120424 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/24/13" }, { "name": "53232", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53232" }, { "name": "[oss-security] 20120424 CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/24/3" }, { "name": "[oss-security] 20120430 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/30/7" }, { "name": "libsoup-ssl-poofing(75167)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167" }, { "name": "[oss-security] 20120502 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/02/8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=666280" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120424 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/24/13" }, { "name": "53232", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53232" }, { "name": "[oss-security] 20120424 CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/24/3" }, { "name": "[oss-security] 20120430 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/30/7" }, { "name": "libsoup-ssl-poofing(75167)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167" }, { "name": "[oss-security] 20120502 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/02/8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=666280" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2132", "datePublished": "2012-08-20T18:00:00", "dateReserved": "2012-04-04T00:00:00", "dateUpdated": "2024-08-06T19:26:08.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-17266
Vulnerability from cvelistv5
Published
2019-10-06 21:48
Modified
2024-08-05 01:33
Severity ?
EPSS score ?
Summary
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.gnome.org/GNOME/libsoup/issues/173 | x_refsource_MISC | |
https://security-tracker.debian.org/tracker/CVE-2019-17266 | x_refsource_MISC | |
https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab | x_refsource_MISC | |
https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md | x_refsource_MISC | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912 | x_refsource_MISC | |
https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html | x_refsource_MISC | |
https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad | x_refsource_MISC | |
https://usn.ubuntu.com/4152-1/ | vendor-advisory, x_refsource_UBUNTU |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:33:17.352Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/173" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2019-17266" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad" }, { "name": "USN-4152-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4152-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message\u0027s length before proceeding with a memcpy." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T20:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/173" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2019-17266" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad" }, { "name": "USN-4152-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4152-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-17266", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message\u0027s length before proceeding with a memcpy." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitlab.gnome.org/GNOME/libsoup/issues/173", "refsource": "MISC", "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/173" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2019-17266", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2019-17266" }, { "name": "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab", "refsource": "MISC", "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab" }, { "name": "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md", "refsource": "MISC", "url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md" }, { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912", "refsource": "MISC", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912" }, { "name": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1705054.html", "refsource": "MISC", "url": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1705054.html" }, { "name": "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad", "refsource": "MISC", "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad" }, { "name": "USN-4152-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4152-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-17266", "datePublished": "2019-10-06T21:48:18", "dateReserved": "2019-10-06T00:00:00", "dateUpdated": "2024-08-05T01:33:17.352Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2524
Vulnerability from cvelistv5
Published
2011-08-31 23:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/47299 | third-party-advisory, x_refsource_SECUNIA | |
http://git.gnome.org/browse/libsoup/tree/NEWS | x_refsource_CONFIRM | |
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html | vendor-advisory, x_refsource_FEDORA | |
http://www.redhat.com/support/errata/RHSA-2011-1102.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id?1025864 | vdb-entry, x_refsource_SECTRACK | |
http://www.debian.org/security/2011/dsa-2369 | vendor-advisory, x_refsource_DEBIAN | |
https://bugzilla.gnome.org/show_bug.cgi?id=653258 | x_refsource_MISC | |
http://www.ubuntu.com/usn/USN-1181-1 | vendor-advisory, x_refsource_UBUNTU |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:34.115Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "47299", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47299" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.gnome.org/browse/libsoup/tree/NEWS" }, { "name": "FEDORA-2011-9763", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html" }, { "name": "RHSA-2011:1102", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1102.html" }, { "name": "1025864", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025864" }, { "name": "DSA-2369", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2369" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=653258" }, { "name": "USN-1181-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1181-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "47299", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47299" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.gnome.org/browse/libsoup/tree/NEWS" }, { "name": "FEDORA-2011-9763", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html" }, { "name": "RHSA-2011:1102", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1102.html" }, { "name": "1025864", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025864" }, { "name": "DSA-2369", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2369" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=653258" }, { "name": "USN-1181-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1181-1" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2524", "datePublished": "2011-08-31T23:00:00", "dateReserved": "2011-06-15T00:00:00", "dateUpdated": "2024-08-06T23:00:34.115Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2018-06-04 14:29
Modified
2024-11-21 03:43
Severity ?
Summary
WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugs.webkit.org/show_bug.cgi?id=126384 | Issue Tracking, Patch, Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201808-04 | ||
cve@mitre.org | https://trac.webkit.org/changeset/228088/webkit | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.webkit.org/show_bug.cgi?id=126384 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201808-04 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://trac.webkit.org/changeset/228088/webkit | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
webkitgtk | webkitgtk\+ | * | |
gnome | libsoup | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*", "matchCriteriaId": "65C019E7-FCF0-4D07-8027-E88E8C38BACE", "versionEndExcluding": "2.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*", "matchCriteriaId": "036A3669-4E94-4183-889D-3C2DFBFA72BD", "versionEndExcluding": "2.62.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection." }, { "lang": "es", "value": "WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp en el backend de red de WebKit, tal y como se emplea en WebKitGTK+ en versiones anteriores a la 2.20.0 o sin libsoup 2.62.0, fall\u00f3 inesperadamente a la hora de emplear las opciones de proxy del sistema para las conexiones WebSocket. Como resultado, los usuarios pueden perder su anonimato mediante sitios web manipulados a los que se accede a trav\u00e9s de una conexi\u00f3n WebSocket." } ], "id": "CVE-2018-11713", "lastModified": "2024-11-21T03:43:52.770", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-06-04T14:29:00.453", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.webkit.org/show_bug.cgi?id=126384" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201808-04" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://trac.webkit.org/changeset/228088/webkit" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.webkit.org/show_bug.cgi?id=126384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201808-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://trac.webkit.org/changeset/228088/webkit" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-05 18:29
Modified
2024-11-21 03:46
Severity ?
Summary
The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | libsoup | 2.63.2 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
canonical | ubuntu_linux | 18.04 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | ansible_tower | 3.3 | |
redhat | openshift_container_platform | 3.11 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
opensuse | leap | 15.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*", "matchCriteriaId": "0CEB94C1-04C2-4A43-A95F-BB8EDF707DB2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5319543-0143-4E2E-AA77-B7F116C1336C", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname." }, { "lang": "es", "value": "La funci\u00f3n get_cookies en soup-cookie-jar.c en libsoup 2.63.2 permite que los atacantes provoquen un impacto no especificado mediante un nombre de host vac\u00edo." } ], "id": "CVE-2018-12910", "lastModified": "2024-11-21T03:46:05.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-05T18:29:00.423", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3505" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/3" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3701-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3701-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4241" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-31 23:55
Modified
2024-11-21 01:28
Severity ?
Summary
Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C5DD5AB-8CB2-4B2E-AE93-3754085845ED", "versionEndIncluding": "2.35.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "99EFB489-06D8-402D-8470-38551BCB2FC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B1C82429-BB29-49E7-ADFA-EED16ED7AFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B9D7017-F606-4466-8F9A-817C6862AD95", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3619C616-7DAB-4035-9D23-2F2336954DBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E672080A-06D2-4C2C-B3D1-BE679D5649BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "6B1B4616-3889-41B6-870F-37DC78A153FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2E1E613A-B333-4E96-90BA-A2AD4363DEB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "8EEDB4A8-5593-47C3-92F3-F91476C0D4F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FD001D38-16AB-4AFB-9DC6-F7A340436E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D5398E1-3FB1-4BEA-9278-F9C041A34BD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "C03F3575-9B90-419C-A5A5-5535F537F096", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.91:*:*:*:*:*:*:*", "matchCriteriaId": "467EDDA7-DA81-4DC5-815F-9D1B394CB02F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.92:*:*:*:*:*:*:*", "matchCriteriaId": "63FE3D88-0596-479B-8E38-E47C7FA04397", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.93:*:*:*:*:*:*:*", "matchCriteriaId": "BF7DEA94-7E9C-457B-B095-66CC23E9681F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.94:*:*:*:*:*:*:*", "matchCriteriaId": "0F806A86-1250-49EE-992A-09574191D087", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "E72DA717-D352-4DCB-BBF9-231284B945F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.96:*:*:*:*:*:*:*", "matchCriteriaId": "19FD71C4-0D7E-4E32-ABFB-35D2943AFC5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.97:*:*:*:*:*:*:*", "matchCriteriaId": "3AE675A3-B03B-4417-8671-F289604C2291", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.98:*:*:*:*:*:*:*", "matchCriteriaId": "5AE3AD41-FAEA-41CE-8317-89E76BE9FE68", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.99:*:*:*:*:*:*:*", "matchCriteriaId": "0DD23A95-C65E-4C2E-BAAC-0D8364A1DBF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.100:*:*:*:*:*:*:*", "matchCriteriaId": "969CB6C0-AD9B-4F48-B77A-0BE3F56B0B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.101:*:*:*:*:*:*:*", "matchCriteriaId": "95B2D824-7560-4779-A844-07D86C2CCAAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.102:*:*:*:*:*:*:*", "matchCriteriaId": "EBCC06A9-A79D-4CB2-ADCD-AC1987E2790B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.103:*:*:*:*:*:*:*", "matchCriteriaId": "25DE1614-7F35-4484-BE88-F9C4D9935EC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.2.104:*:*:*:*:*:*:*", "matchCriteriaId": "1756B5C1-18E1-4C6D-89AD-17432B29EBB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "22EA54CB-F7C9-4B17-9118-BA335B9E8D46", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "0C43A424-B38A-4819-AFC3-3532C447DF9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "3C994C81-6B80-47E8-AD70-B2DC7BF12209", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC08FAE6-B41F-41B8-B819-F582DBEA918A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D6E08FA-E647-42B7-A033-806DAC1F4951", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "2752C2FA-7627-4488-88A5-5E6F76FC8F3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.23.6:*:*:*:*:*:*:*", "matchCriteriaId": "1F4AE3DE-5379-47A0-9BDC-AB49323F85C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.23.91:*:*:*:*:*:*:*", "matchCriteriaId": "896575A0-8B7B-43BE-A653-0BEF54E3049B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.23.92:*:*:*:*:*:*:*", "matchCriteriaId": "A02CCE6B-C774-4D9C-AD88-69D24651E1F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.24.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9299BB6F-DF57-427C-A0D0-7F872810420B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEB94071-AB85-412E-A31B-29FD8189484D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.25.2:*:*:*:*:*:*:*", "matchCriteriaId": "0BC56735-58B1-4780-ABA9-32501C24B56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.25.3:*:*:*:*:*:*:*", "matchCriteriaId": "72B7C474-9C79-4C1F-B0A3-A5780F87379A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.25.4:*:*:*:*:*:*:*", "matchCriteriaId": "BF3B6CBD-5F44-4FC6-83B7-41134055D1AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.25.5:*:*:*:*:*:*:*", "matchCriteriaId": "832089BA-670E-40E1-A812-164F13FE29C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.25.91:*:*:*:*:*:*:*", "matchCriteriaId": "6C76B162-8BCC-43A9-A00B-BEDC16F02C2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "42B5A587-2F23-42CB-BE0F-1F5A4E96AD06", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "C713940D-24D7-429F-B961-E3E1651F30C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.27.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C537C96-A138-4D5D-A657-E04D3E2B04AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.27.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C5EFE4E-ED20-4CB2-B0DE-D7A726F26221", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.27.4:*:*:*:*:*:*:*", "matchCriteriaId": "99340F6B-F033-497F-AD66-655504495CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.27.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DFE407F-7F02-4E08-9242-41E51A436F1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.27.90:*:*:*:*:*:*:*", "matchCriteriaId": "A838EB16-BC34-4747-84E6-FD31718BC708", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.27.91:*:*:*:*:*:*:*", "matchCriteriaId": "EB6F6369-34FD-47D2-A829-BB36CBAAA99A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.27.92:*:*:*:*:*:*:*", "matchCriteriaId": "054A96BA-6584-4D6B-AEB5-FE12209E5C69", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "0FAB459F-29F5-4AD9-95F4-95F5D05FE91B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "9FFD7530-6548-4A91-9A0A-F80429368E4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.29.3:*:*:*:*:*:*:*", "matchCriteriaId": "0B48661A-D82E-49D7-917C-3D6A3A7CE116", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.29.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA0FA486-3657-48DC-9E10-11EE8A1458B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.29.6:*:*:*:*:*:*:*", "matchCriteriaId": "15F7CFA6-628D-4CF5-93EB-55519CF955EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.29.90:*:*:*:*:*:*:*", "matchCriteriaId": "5D1878C5-80C7-4DC2-987C-1BC52E63A8C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.29.91:*:*:*:*:*:*:*", "matchCriteriaId": "7D7E6439-AC14-4D45-BC73-C0BF7E79BE9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2E158D5-987A-4F93-82A0-CF74527CA210", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.30.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE0D94D2-D74A-448F-9DF5-4B4C23138E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.31.2:*:*:*:*:*:*:*", "matchCriteriaId": "0D363498-6F1D-4EEF-853D-905F1D95E62D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.31.6:*:*:*:*:*:*:*", "matchCriteriaId": "981AF805-9646-4913-B274-1969AFACC734", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.31.90:*:*:*:*:*:*:*", "matchCriteriaId": "C1197161-E084-4485-BA72-B60C07469680", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.31.92:*:*:*:*:*:*:*", "matchCriteriaId": "F9E91156-537E-4885-87C2-EC4BA8C2B306", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.32.0:*:*:*:*:*:*:*", "matchCriteriaId": "9130A56A-2995-455A-8A51-1A0A85F3D38E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.32.1:*:*:*:*:*:*:*", "matchCriteriaId": "F3A81CD2-1192-4F9E-8BF4-BF86445E11AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.32.2:*:*:*:*:*:*:*", "matchCriteriaId": "92398648-8754-4130-BA90-A54838AFA159", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.33.4:*:*:*:*:*:*:*", "matchCriteriaId": "C536F346-4B27-4A53-A942-68531D9991A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.33.5:*:*:*:*:*:*:*", "matchCriteriaId": "8F602177-543B-4A42-92C1-53F1573518FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.33.6:*:*:*:*:*:*:*", "matchCriteriaId": "8011A42F-B7EF-44F2-BE9A-E2543EB1C808", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.33.90:*:*:*:*:*:*:*", "matchCriteriaId": "EC3501F1-B153-4870-A7A4-741ACA848656", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.33.92:*:*:*:*:*:*:*", "matchCriteriaId": "398B638B-9879-403D-9F55-59FCC8CE3F31", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "A16CBF8D-7411-4E16-81B0-47696F036C35", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:2.34.1:*:*:*:*:*:*:*", "matchCriteriaId": "4AC22BA2-D63A-48F8-BF0F-90D664EA6856", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI." }, { "lang": "es", "value": "Una vulnerabilidad de salto de directorio en la soup-uri.c en SoupServer en libsoup antes de v2.35.4 permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de un %2e%2e (punto punto) en la URI." } ], "id": "CVE-2011-2524", "lastModified": "2024-11-21T01:28:27.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-31T23:55:02.957", "references": [ { "source": "secalert@redhat.com", "url": "http://git.gnome.org/browse/libsoup/tree/NEWS" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/47299" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2369" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1102.html" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1025864" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1181-1" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=653258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.gnome.org/browse/libsoup/tree/NEWS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/47299" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1102.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025864" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1181-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=653258" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-06 22:15
Modified
2024-11-21 04:31
Severity ?
Summary
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | libsoup | * | |
gnome | libsoup | * | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*", "matchCriteriaId": "82D58806-8762-4FD9-9658-6C4809D1E432", "versionEndExcluding": "2.66.4", "versionStartIncluding": "2.65.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*", "matchCriteriaId": "73D27E8B-ABB1-436E-85B8-A692C8237393", "versionEndIncluding": "2.68.1", "versionStartIncluding": "2.67.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message\u0027s length before proceeding with a memcpy." }, { "lang": "es", "value": "libsoup desde las versiones 2.65.1 hasta 2.68.1 presenta una lectura excesiva de b\u00fafer en la regi\u00f3n heap de la memoria porque la funci\u00f3n soup_ntlm_parse_challenge() en el archivo soup-auth-ntlm.c no comprueba apropiadamente la longitud de un mensaje NTLM antes del procesamiento con una memcpy." } ], "id": "CVE-2019-17266", "lastModified": "2024-11-21T04:31:59.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-06T22:15:10.367", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Issue Tracking", "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/173" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2019-17266" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4152-1/" }, { "source": "cve@mitre.org", "url": "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Issue Tracking", "Third Party Advisory" ], "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2019-17266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4152-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2024-11-21 01:38
Severity ?
Summary
libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:libsoup:2.32.2:*:*:*:*:*:*:*", "matchCriteriaId": "92398648-8754-4130-BA90-A54838AFA159", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection." }, { "lang": "es", "value": "libsoup v2.32.2 y anteriores no valida los certificados o elimina el indicador de \u0027confiable\u0027 cuando el archivo ssl-ca-file no existe, lo que permite a atacantes remotos evitar la autenticaci\u00f3n mediante el uso de una conexi\u00f3n SSL.\r\n" } ], "id": "CVE-2012-2132", "lastModified": "2024-11-21T01:38:33.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-20T18:55:03.043", "references": [ { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/04/24/13" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/04/24/3" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/04/30/7" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/05/02/8" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/53232" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.gnome.org/show_bug.cgi?id=666280" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/04/24/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/04/24/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/04/30/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/05/02/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.gnome.org/show_bug.cgi?id=666280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-04-24 19:29
Modified
2024-11-21 03:24
Severity ?
Summary
An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | libsoup | 2.58 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.5 | |
redhat | enterprise_linux_server_tus | 7.4 | |
redhat | enterprise_linux_workstation | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:libsoup:2.58:*:*:*:*:*:*:*", "matchCriteriaId": "4BD5FB77-9583-4CFE-858A-774344AE8222", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability." }, { "lang": "es", "value": "Existe una vulnerabilidad explotable de desbordamiento de b\u00fafer basado en pila en GNOME libsoup 2.58. Una petici\u00f3n HTTP especialmente manipulada puede provocar un desbordamiento de pila que dar\u00eda lugar a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede enviar una petici\u00f3n HTTP especial al servidor vulnerable para desencadenar esta vulnerabilidad." } ], "id": "CVE-2017-2885", "lastModified": "2024-11-21T03:24:23.510", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "talos-cna@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-24T19:29:02.783", "references": [ { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html" }, { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/3" }, { "source": "talos-cna@cisco.com", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/100258" }, { "source": "talos-cna@cisco.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2459" }, { "source": "talos-cna@cisco.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3929" }, { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/100258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392" } ], "sourceIdentifier": "talos-cna@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }