Vulnerability Name:

CVE-2017-9765 (CCN-129136)

Assigned:2017-07-19
Published:2017-07-19
Updated:2017-09-16
Summary:Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy.
Note: the large document would be blocked by many common web-server configurations on general-purpose computers.
CVSS v3 Severity:8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): 
Attack Complexity (AC): 
Privileges Required (PR): 
User Interaction (UI): 
Scope:Scope (S): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): 
Attack Complexity (AC): 
Privileges Required (PR): 
User Interaction (UI): 
Scope:Scope (S): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-190
Vulnerability Consequences:Gain Access
References:Source: MISC
Type: Mitigation, Technical Description, Third Party Advisory
http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions

Source: MISC
Type: Exploit, Technical Description, Third Party Advisory
http://blog.senr.io/devilsivy.html

Source: MITRE
Type: CNA
CVE-2017-9765

Source: CCN
Type: JVNVU#98807587
gSOAP vulnerable to stack-based buffer overflow

Source: BID
Type: Third Party Advisory, VDB Entry
99868

Source: CCN
Type: BID-99868
Genivia gSOAP CVE-2017-9765 Stack Based Buffer Overflow Vulnerability

Source: CCN
Type: Red Hat Bugzilla – Bug 1472807
(CVE-2017-9765) CVE-2017-9765 gsoap: Stack-based buffer overflow when receieving XML message with size larger than 2GB

Source: MISC
Type: Issue Tracking, Third Party Advisory, VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1472807

Source: MISC
Type: Issue Tracking, Third Party Advisory, VDB Entry
https://bugzilla.suse.com/show_bug.cgi?id=1049348

Source: XF
Type: UNKNOWN
genivia-cve20179765-bo(129136)

Source: CCN
Type: Genivia Web site
Security advisory: CVE-2017-9765 bug in certain versions of gSOAP 2.7 up to 2.8.47 (June 21, 2017)

Source: MISC
Type: Patch, Vendor Advisory
https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_%28June_21,_2017%29

Source: MISC
Type: Release Notes, Vendor Advisory
https://www.genivia.com/changelog.html#Version_2.8.48_upd_%2806/21/2017%29

Vulnerable Configuration:Configuration 1:
  • cpe:/a:genivia:gsoap:2.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.2:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.4:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.5:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.6:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.7:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.8:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.9:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.10:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.11:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.12:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.13:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.14:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.15:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.16:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.7.17:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.4:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.5:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.6:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.7:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.8:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.9:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.10:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.11:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.12:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.13:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.14:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.15:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.16:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.17:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.18:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.19:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.20:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.21:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.22:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.23:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.24:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.25:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.26:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.27:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.28:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.29:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.30:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.31:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.32:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.33:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.34:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.35:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.36:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.37:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.38:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.39:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.40:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.41:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.42:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.43:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.44:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.45:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.46:*:*:*:*:*:*:*
  • OR cpe:/a:genivia:gsoap:2.8.47:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:genivia:gsoap:2.8.47:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2017-9765 (CCN-129223)

    Assigned:2017-06-21
    Published:2017-06-21
    Updated:2017-09-16
    Summary:Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy.
    Note: the large document would be blocked by many common web-server configurations on general-purpose computers.
    CVSS v3 Severity:8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
    7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
    Exploitability Metrics:Attack Vector (AV): 
    Attack Complexity (AC): 
    Privileges Required (PR): 
    User Interaction (UI): 
    Scope:Scope (S): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
    Exploitability Metrics:Attack Vector (AV): 
    Attack Complexity (AC): 
    Privileges Required (PR): 
    User Interaction (UI): 
    Scope:Scope (S): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Medium
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    Vulnerability Type:CWE-190
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2017-9765

    Source: CCN
    Type: JVNVU#98807587
    gSOAP vulnerable to stack-based buffer overflow

    Source: CCN
    Type: BID-99868
    Genivia gSOAP CVE-2017-9765 Stack Based Buffer Overflow Vulnerability

    Source: XF
    Type: UNKNOWN
    genivia-gsoap-cve20179765-bo(129223)

    Source: CCN
    Type: Genivia Web site
    Genivia Product Advisory

    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20179765
    V
    CVE-2017-9765
    2022-06-30
    oval:org.opensuse.security:def:112367
    P
    gsoap-devel-2.8.117-1.2 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:105878
    P
    Security update for xorg-x11-server (Important)
    2021-12-14
    oval:com.ubuntu.bionic:def:201797650000000
    V
    CVE-2017-9765 on Ubuntu 18.04 LTS (bionic) - medium.
    2017-07-20
    oval:com.ubuntu.xenial:def:201797650000000
    V
    CVE-2017-9765 on Ubuntu 16.04 LTS (xenial) - medium.
    2017-07-20
    oval:com.ubuntu.disco:def:201797650000000
    V
    CVE-2017-9765 on Ubuntu 19.04 (disco) - medium.
    2017-07-20
    oval:com.ubuntu.artful:def:20179765000
    V
    CVE-2017-9765 on Ubuntu 17.10 (artful) - medium.
    2017-07-19
    oval:com.ubuntu.xenial:def:20179765000
    V
    CVE-2017-9765 on Ubuntu 16.04 LTS (xenial) - medium.
    2017-07-19
    oval:com.ubuntu.bionic:def:20179765000
    V
    CVE-2017-9765 on Ubuntu 18.04 LTS (bionic) - medium.
    2017-07-19
    oval:com.ubuntu.cosmic:def:20179765000
    V
    CVE-2017-9765 on Ubuntu 18.10 (cosmic) - medium.
    2017-07-19
    oval:com.ubuntu.cosmic:def:201797650000000
    V
    CVE-2017-9765 on Ubuntu 18.10 (cosmic) - medium.
    2017-07-19
    oval:com.ubuntu.trusty:def:20179765000
    V
    CVE-2017-9765 on Ubuntu 14.04 LTS (trusty) - medium.
    2017-07-19
    BACK
    genivia gsoap 2.7.0
    genivia gsoap 2.7.1
    genivia gsoap 2.7.2
    genivia gsoap 2.7.3
    genivia gsoap 2.7.4
    genivia gsoap 2.7.5
    genivia gsoap 2.7.6
    genivia gsoap 2.7.7
    genivia gsoap 2.7.8
    genivia gsoap 2.7.9
    genivia gsoap 2.7.10
    genivia gsoap 2.7.11
    genivia gsoap 2.7.12
    genivia gsoap 2.7.13
    genivia gsoap 2.7.14
    genivia gsoap 2.7.15
    genivia gsoap 2.7.16
    genivia gsoap 2.7.17
    genivia gsoap 2.8.0
    genivia gsoap 2.8.1
    genivia gsoap 2.8.2
    genivia gsoap 2.8.3
    genivia gsoap 2.8.4
    genivia gsoap 2.8.5
    genivia gsoap 2.8.6
    genivia gsoap 2.8.7
    genivia gsoap 2.8.8
    genivia gsoap 2.8.9
    genivia gsoap 2.8.10
    genivia gsoap 2.8.11
    genivia gsoap 2.8.12
    genivia gsoap 2.8.13
    genivia gsoap 2.8.14
    genivia gsoap 2.8.15
    genivia gsoap 2.8.16
    genivia gsoap 2.8.17
    genivia gsoap 2.8.18
    genivia gsoap 2.8.19
    genivia gsoap 2.8.20
    genivia gsoap 2.8.21
    genivia gsoap 2.8.22
    genivia gsoap 2.8.23
    genivia gsoap 2.8.24
    genivia gsoap 2.8.25
    genivia gsoap 2.8.26
    genivia gsoap 2.8.27
    genivia gsoap 2.8.28
    genivia gsoap 2.8.29
    genivia gsoap 2.8.30
    genivia gsoap 2.8.31
    genivia gsoap 2.8.32
    genivia gsoap 2.8.33
    genivia gsoap 2.8.34
    genivia gsoap 2.8.35
    genivia gsoap 2.8.36
    genivia gsoap 2.8.37
    genivia gsoap 2.8.38
    genivia gsoap 2.8.39
    genivia gsoap 2.8.40
    genivia gsoap 2.8.41
    genivia gsoap 2.8.42
    genivia gsoap 2.8.43
    genivia gsoap 2.8.44
    genivia gsoap 2.8.45
    genivia gsoap 2.8.46
    genivia gsoap 2.8.47
    genivia gsoap 2.8.47