[c-nsp] Cisco Security Advisory: Portable SDK for UPnP Devices Contains Buffer Overflow Vulnerabilities

Cisco Systems Product Security Incident Response Team psirt at cisco.com
Tue Jan 29 15:18:26 EST 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Security Advisory: Portable SDK for UPnP Devices Contains Buffer Overflow
Vulnerabilities

Advisory ID: cisco-sa-20130129-upnp

Revision 1.0

For Public Release 2013 January 29 16:00  UTC (GMT)

+--------------------------------------------------------------------

Summary
=======

The Portable Software Developer Kit (SDK) for Universal Plug-n-Play
(UPnP) devices contain a libupnp library, originally known as the Intel
SDK for UPnP Devices, which is vulnerable to multiple stack-based
buffer overflows when handling malicious Simple Service Discovery
Protocol (SSDP) requests. This library is used in several vendor network
devices in addition to media streaming and file sharing applications.
These vulnerabilities were disclosed on January 29th, 2013 in a CERT
Vulnerability Note, VU#922681, which can be viewed at:

http://www.kb.cert.org/vuls/id/922681

Cisco is currently evaluating products for possible exposure to these
vulnerabilities. This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iF4EAREIAAYFAlEIJZ8ACgkQUddfH3/BbTrUagD9FnKSVkc2iIfGs+7c8SVPT26+
ga5hYEz9UMUnitcqnbcBAIKe6KnkR6he2zbstVtbTKtqSjE7pfVb3lTKVZSeAkM5
=6sTu
-----END PGP SIGNATURE-----


More information about the cisco-nsp mailing list