Debian Security Advisory
DSA-3379-1 miniupnpc -- security update
- Date Reported:
- 25 Oct 2015
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 802650.
In Mitre's CVE dictionary: CVE-2015-6031.
- More information:
Aleksandar Nikolic of Cisco Talos discovered a buffer overflow vulnerability in the XML parser functionality of miniupnpc, a UPnP IGD client lightweight library. A remote attacker can take advantage of this flaw to cause an application using the miniupnpc library to crash, or potentially to execute arbitrary code with the privileges of the user running the application.
For the oldstable distribution (wheezy), this problem has been fixed in version 1.5-2+deb7u1.
For the stable distribution (jessie), this problem has been fixed in version 1.9.20140610-2+deb8u1.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your miniupnpc packages.