Vulnerability Name:

CVE-2015-6031 (CCN-107492)

Assigned:2015-10-25
Published:2015-10-25
Updated:2019-06-18
Summary:Buffer overflow in the IGDstartelt function in igd_desc_parse.c in the MiniUPnP client (aka MiniUPnPc) before 1.9.20150917 allows remote UPNP servers to cause a denial of service (application crash) and possibly execute arbitrary code via an "oversized" XML element name.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2015-6031

Source: SUSE
Type: Mailing List, Third Party Advisory
openSUSE-SU-2015:2070

Source: CCN
Type: BugTraq Mailing List, Sun, 25 Oct 2015 12:38:19 +0000
[SECURITY] [DSA 3379-1] miniupnpc security update

Source: MISC
Type: Exploit
http://talosintel.com/reports/TALOS-2015-0035/

Source: DEBIAN
Type: Third Party Advisory
DSA-3379

Source: BID
Type: Third Party Advisory, VDB Entry
77306

Source: CCN
Type: BID-77306
MiniUPnP 'igd_desc_parse.c' Buffer Overflow Vulnerability

Source: UBUNTU
Type: Third Party Advisory
USN-2780-1

Source: UBUNTU
Type: Third Party Advisory
USN-2780-2

Source: XF
Type: UNKNOWN
miniupnpc-cve20156031-dos(107492)

Source: CONFIRM
Type: Third Party Advisory
https://github.com/miniupnp/miniupnp/blob/master/miniupnpc/Changelog.txt

Source: CONFIRM
Type: Third Party Advisory
https://github.com/miniupnp/miniupnp/commit/79cca974a4c2ab1199786732a67ff6d898051b78

Source: CCN
Type: Debian Packages Web site
UPnP IGD client lightweight library client

Source: GENTOO
Type: Third Party Advisory
GLSA-201801-08

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2015-6031

Vulnerable Configuration:Configuration 1:
  • cpe:/a:miniupnp_project:miniupnpc:*:*:*:*:*:*:*:* (Version <= 1.9)
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2014-02-03:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2014-02-05:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2014-05-15:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2014-06-10:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2014-07-01:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2014-09-06:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2014-09-11:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2014-11-05:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2014-11-13:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2014-11-17:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2015-04-27:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2015-04-30:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2015-05-22:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2015-06-16:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2015-07-15:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2015-07-22:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2015-07-23:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2015-08-16:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2015-08-27:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2015-08-28:*:*:*:*:*:*
  • OR cpe:/a:miniupnp_project:miniupnpc:1.9:2015-09-15:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:opensuse:leap:42.1:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20156031
    V
    CVE-2015-6031
    2019-09-27
    oval:org.cisecurity:def:285
    P
    DSA-3379-1 miniupnpc -- security update
    2016-02-08
    oval:com.ubuntu.precise:def:20156031000
    V
    CVE-2015-6031 on Ubuntu 12.04 LTS (precise) - medium.
    2015-11-02
    oval:com.ubuntu.trusty:def:20156031000
    V
    CVE-2015-6031 on Ubuntu 14.04 LTS (trusty) - medium.
    2015-11-02
    BACK
    miniupnp_project miniupnpc *
    miniupnp_project miniupnpc 1.9 2014-02-03
    miniupnp_project miniupnpc 1.9 2014-02-05
    miniupnp_project miniupnpc 1.9 2014-05-15
    miniupnp_project miniupnpc 1.9 2014-06-10
    miniupnp_project miniupnpc 1.9 2014-07-01
    miniupnp_project miniupnpc 1.9 2014-09-06
    miniupnp_project miniupnpc 1.9 2014-09-11
    miniupnp_project miniupnpc 1.9 2014-11-05
    miniupnp_project miniupnpc 1.9 2014-11-13
    miniupnp_project miniupnpc 1.9 2014-11-17
    miniupnp_project miniupnpc 1.9 2015-04-27
    miniupnp_project miniupnpc 1.9 2015-04-30
    miniupnp_project miniupnpc 1.9 2015-05-22
    miniupnp_project miniupnpc 1.9 2015-06-16
    miniupnp_project miniupnpc 1.9 2015-07-15
    miniupnp_project miniupnpc 1.9 2015-07-22
    miniupnp_project miniupnpc 1.9 2015-07-23
    miniupnp_project miniupnpc 1.9 2015-08-16
    miniupnp_project miniupnpc 1.9 2015-08-27
    miniupnp_project miniupnpc 1.9 2015-08-28
    miniupnp_project miniupnpc 1.9 2015-09-15
    debian debian linux 7.0
    debian debian linux 8.0
    canonical ubuntu linux 12.04
    canonical ubuntu linux 14.04
    canonical ubuntu linux 15.04
    opensuse leap 42.1
    opensuse opensuse 13.1
    opensuse opensuse 13.2