| Vulnerability Name: | CVE-2017-9765 (CCN-129136) |
| Assigned: | 2017-07-19 |
| Published: | 2017-07-19 |
| Updated: | 2017-09-16 |
| Summary: | Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. Note: the large document would be blocked by many common web-server configurations on general-purpose computers.
|
| CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)| Exploitability Metrics: | Attack Vector (AV): Attack Complexity (AC): Privileges Required (PR): User Interaction (UI): | | Scope: | Scope (S):
| | Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) 6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)| Exploitability Metrics: | Attack Vector (AV): Attack Complexity (AC): Privileges Required (PR): User Interaction (UI): | | Scope: | Scope (S):
| | Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): |
|
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)| Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)| Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
| Vulnerability Type: | CWE-190
|
| Vulnerability Consequences: | Gain Access |
| References: | Source: MISC Type: Mitigation, Technical Description, Third Party Advisory http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions
Source: MISC Type: Exploit, Technical Description, Third Party Advisory http://blog.senr.io/devilsivy.html
Source: MITRE Type: CNA CVE-2017-9765
Source: CCN Type: JVNVU#98807587 gSOAP vulnerable to stack-based buffer overflow
Source: BID Type: Third Party Advisory, VDB Entry 99868
Source: CCN Type: BID-99868 Genivia gSOAP CVE-2017-9765 Stack Based Buffer Overflow Vulnerability
Source: CCN Type: Red Hat Bugzilla Bug 1472807 (CVE-2017-9765) CVE-2017-9765 gsoap: Stack-based buffer overflow when receieving XML message with size larger than 2GB
Source: MISC Type: Issue Tracking, Third Party Advisory, VDB Entry https://bugzilla.redhat.com/show_bug.cgi?id=1472807
Source: MISC Type: Issue Tracking, Third Party Advisory, VDB Entry https://bugzilla.suse.com/show_bug.cgi?id=1049348
Source: XF Type: UNKNOWN genivia-cve20179765-bo(129136)
Source: CCN Type: Genivia Web site Security advisory: CVE-2017-9765 bug in certain versions of gSOAP 2.7 up to 2.8.47 (June 21, 2017)
Source: MISC Type: Patch, Vendor Advisory https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_%28June_21,_2017%29
Source: MISC Type: Release Notes, Vendor Advisory https://www.genivia.com/changelog.html#Version_2.8.48_upd_%2806/21/2017%29
|
| Vulnerable Configuration: | Configuration 1: cpe:/a:genivia:gsoap:2.7.0:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.1:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.2:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.3:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.4:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.5:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.6:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.7:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.8:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.9:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.10:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.11:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.12:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.13:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.14:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.15:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.16:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.7.17:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.0:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.1:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.2:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.3:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.4:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.5:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.6:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.7:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.8:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.9:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.10:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.11:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.12:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.13:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.14:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.15:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.16:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.17:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.18:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.19:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.20:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.21:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.22:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.23:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.24:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.25:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.26:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.27:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.28:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.29:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.30:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.31:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.32:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.33:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.34:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.35:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.36:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.37:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.38:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.39:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.40:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.41:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.42:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.43:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.44:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.45:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.46:*:*:*:*:*:*:*OR cpe:/a:genivia:gsoap:2.8.47:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:genivia:gsoap:2.8.47:*:*:*:*:*:*:*
Denotes that component is vulnerable |
| Vulnerability Name: | CVE-2017-9765 (CCN-129223) |
| Assigned: | 2017-06-21 |
| Published: | 2017-06-21 |
| Updated: | 2017-09-16 |
| Summary: | Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. Note: the large document would be blocked by many common web-server configurations on general-purpose computers.
|
| CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)| Exploitability Metrics: | Attack Vector (AV): Attack Complexity (AC): Privileges Required (PR): User Interaction (UI): | | Scope: | Scope (S):
| | Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) 6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)| Exploitability Metrics: | Attack Vector (AV): Attack Complexity (AC): Privileges Required (PR): User Interaction (UI): | | Scope: | Scope (S):
| | Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): |
|
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)| Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)| Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
| Vulnerability Type: | CWE-190
|
| Vulnerability Consequences: | Gain Access |
| References: | Source: MITRE Type: CNA CVE-2017-9765
Source: CCN Type: JVNVU#98807587 gSOAP vulnerable to stack-based buffer overflow
Source: CCN Type: BID-99868 Genivia gSOAP CVE-2017-9765 Stack Based Buffer Overflow Vulnerability
Source: XF Type: UNKNOWN genivia-gsoap-cve20179765-bo(129223)
Source: CCN Type: Genivia Web site Genivia Product Advisory
|
| Oval Definitions |
|
| BACK |