Vulnerabilites related to GNOME - libsoup
cve-2011-2524
Vulnerability from cvelistv5
Published
2011-08-31 23:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/47299 | third-party-advisory, x_refsource_SECUNIA | |
http://git.gnome.org/browse/libsoup/tree/NEWS | x_refsource_CONFIRM | |
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html | vendor-advisory, x_refsource_FEDORA | |
http://www.redhat.com/support/errata/RHSA-2011-1102.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id?1025864 | vdb-entry, x_refsource_SECTRACK | |
http://www.debian.org/security/2011/dsa-2369 | vendor-advisory, x_refsource_DEBIAN | |
https://bugzilla.gnome.org/show_bug.cgi?id=653258 | x_refsource_MISC | |
http://www.ubuntu.com/usn/USN-1181-1 | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T23:00:34.115Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "47299", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/47299", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.gnome.org/browse/libsoup/tree/NEWS", }, { name: "FEDORA-2011-9763", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html", }, { name: "RHSA-2011:1102", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2011-1102.html", }, { name: "1025864", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1025864", }, { name: "DSA-2369", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2011/dsa-2369", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=653258", }, { name: "USN-1181-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-1181-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2011-07-28T00:00:00", descriptions: [ { lang: "en", value: "Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2012-01-19T10:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "47299", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/47299", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.gnome.org/browse/libsoup/tree/NEWS", }, { name: "FEDORA-2011-9763", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html", }, { name: "RHSA-2011:1102", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2011-1102.html", }, { name: "1025864", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1025864", }, { name: "DSA-2369", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2011/dsa-2369", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=653258", }, { name: "USN-1181-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-1181-1", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2011-2524", datePublished: "2011-08-31T23:00:00", dateReserved: "2011-06-15T00:00:00", dateUpdated: "2024-08-06T23:00:34.115Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-12910
Vulnerability from cvelistv5
Published
2018-07-05 18:00
Modified
2024-08-05 08:45
Severity ?
EPSS score ?
Summary
The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:45:02.430Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "FEDORA-2018-fb2afee474", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://gitlab.gnome.org/GNOME/libsoup/issues/3", }, { name: "RHSA-2018:3505", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { name: "DSA-4241", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2018/dsa-4241", }, { name: "[debian-lts-announce] 20180706 [SECURITY] [DLA 1416-1] libsoup2.4 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html", }, { name: "USN-3701-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3701-1/", }, { name: "RHSA-2018:3140", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3140", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f", }, { name: "RHBA-2019:0327", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHBA-2019:0327", }, { name: "openSUSE-SU-2019:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-06-25T00:00:00", descriptions: [ { lang: "en", value: "The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-02T23:06:02", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "FEDORA-2018-fb2afee474", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://gitlab.gnome.org/GNOME/libsoup/issues/3", }, { name: "RHSA-2018:3505", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { name: "DSA-4241", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2018/dsa-4241", }, { name: "[debian-lts-announce] 20180706 [SECURITY] [DLA 1416-1] libsoup2.4 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html", }, { name: "USN-3701-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3701-1/", }, { name: "RHSA-2018:3140", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3140", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f", }, { name: "RHBA-2019:0327", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHBA-2019:0327", }, { name: "openSUSE-SU-2019:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-12910", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "FEDORA-2018-fb2afee474", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/", }, { name: "https://gitlab.gnome.org/GNOME/libsoup/issues/3", refsource: "CONFIRM", url: "https://gitlab.gnome.org/GNOME/libsoup/issues/3", }, { name: "RHSA-2018:3505", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { name: "DSA-4241", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4241", }, { name: "[debian-lts-announce] 20180706 [SECURITY] [DLA 1416-1] libsoup2.4 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html", }, { name: "USN-3701-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3701-1/", }, { name: "RHSA-2018:3140", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3140", }, { name: "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047", refsource: "CONFIRM", url: "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047", }, { name: "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f", refsource: "CONFIRM", url: "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f", }, { name: "RHBA-2019:0327", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHBA-2019:0327", }, { name: "openSUSE-SU-2019:1310", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-12910", datePublished: "2018-07-05T18:00:00", dateReserved: "2018-06-27T00:00:00", dateUpdated: "2024-08-05T08:45:02.430Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-17266
Vulnerability from cvelistv5
Published
2019-10-06 21:48
Modified
2024-08-05 01:33
Severity ?
EPSS score ?
Summary
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
References
▼ | URL | Tags |
---|---|---|
https://gitlab.gnome.org/GNOME/libsoup/issues/173 | x_refsource_MISC | |
https://security-tracker.debian.org/tracker/CVE-2019-17266 | x_refsource_MISC | |
https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab | x_refsource_MISC | |
https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md | x_refsource_MISC | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912 | x_refsource_MISC | |
https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html | x_refsource_MISC | |
https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad | x_refsource_MISC | |
https://usn.ubuntu.com/4152-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T01:33:17.352Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://gitlab.gnome.org/GNOME/libsoup/issues/173", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://security-tracker.debian.org/tracker/CVE-2019-17266", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad", }, { name: "USN-4152-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4152-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-09T20:06:08", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://gitlab.gnome.org/GNOME/libsoup/issues/173", }, { tags: [ "x_refsource_MISC", ], url: "https://security-tracker.debian.org/tracker/CVE-2019-17266", }, { tags: [ "x_refsource_MISC", ], url: "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md", }, { tags: [ "x_refsource_MISC", ], url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912", }, { tags: [ "x_refsource_MISC", ], url: "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html", }, { tags: [ "x_refsource_MISC", ], url: "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad", }, { name: "USN-4152-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4152-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-17266", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://gitlab.gnome.org/GNOME/libsoup/issues/173", refsource: "MISC", url: "https://gitlab.gnome.org/GNOME/libsoup/issues/173", }, { name: "https://security-tracker.debian.org/tracker/CVE-2019-17266", refsource: "MISC", url: "https://security-tracker.debian.org/tracker/CVE-2019-17266", }, { name: "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab", refsource: "MISC", url: "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab", }, { name: "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md", refsource: "MISC", url: "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md", }, { name: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912", refsource: "MISC", url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912", }, { name: "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1705054.html", refsource: "MISC", url: "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1705054.html", }, { name: "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad", refsource: "MISC", url: "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad", }, { name: "USN-4152-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4152-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-17266", datePublished: "2019-10-06T21:48:18", dateReserved: "2019-10-06T00:00:00", dateUpdated: "2024-08-05T01:33:17.352Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-52531
Vulnerability from cvelistv5
Published
2024-11-11 00:00
Modified
2025-04-14 15:13
Severity ?
EPSS score ?
Summary
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "libsoup", vendor: "gnome", versions: [ { lessThan: "3.6.1", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-52531", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-04-14T15:09:47.037163Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-04-14T15:13:46.136Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, references: [ { tags: [ "exploit", ], url: "https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html", }, ], title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "libsoup", vendor: "GNOME", versions: [ { lessThan: "3.6.1", status: "affected", version: "0", versionType: "semver", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*", versionEndExcluding: "3.6.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], descriptions: [ { lang: "en", value: "GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).", }, ], metrics: [ { cvssV3_1: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-787", description: "CWE-787 Out-of-bounds Write", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-25T17:25:59.440Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home", }, { url: "https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407", }, { url: "https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407#note_2316401", }, { url: "https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html", }, ], x_generator: { engine: "enrichogram 0.0.1", }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2024-52531", datePublished: "2024-11-11T00:00:00.000Z", dateReserved: "2024-11-11T00:00:00.000Z", dateUpdated: "2025-04-14T15:13:46.136Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-11713
Vulnerability from cvelistv5
Published
2018-06-04 14:00
Modified
2024-08-05 08:17
Severity ?
EPSS score ?
Summary
WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.
References
▼ | URL | Tags |
---|---|---|
https://trac.webkit.org/changeset/228088/webkit | x_refsource_MISC | |
https://security.gentoo.org/glsa/201808-04 | vendor-advisory, x_refsource_GENTOO | |
https://bugs.webkit.org/show_bug.cgi?id=126384 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:17:08.955Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://trac.webkit.org/changeset/228088/webkit", }, { name: "GLSA-201808-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201808-04", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.webkit.org/show_bug.cgi?id=126384", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-06-04T00:00:00", descriptions: [ { lang: "en", value: "WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-21T09:57:02", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://trac.webkit.org/changeset/228088/webkit", }, { name: "GLSA-201808-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201808-04", }, { tags: [ "x_refsource_MISC", ], url: "https://bugs.webkit.org/show_bug.cgi?id=126384", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-11713", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://trac.webkit.org/changeset/228088/webkit", refsource: "MISC", url: "https://trac.webkit.org/changeset/228088/webkit", }, { name: "GLSA-201808-04", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201808-04", }, { name: "https://bugs.webkit.org/show_bug.cgi?id=126384", refsource: "MISC", url: "https://bugs.webkit.org/show_bug.cgi?id=126384", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-11713", datePublished: "2018-06-04T14:00:00", dateReserved: "2018-06-04T00:00:00", dateUpdated: "2024-08-05T08:17:08.955Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-2885
Vulnerability from cvelistv5
Published
2018-04-24 19:00
Modified
2024-09-17 03:32
Severity ?
EPSS score ?
Summary
An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2017:2459 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2017/dsa-3929 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/100258 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2020/Dec/3 | mailing-list, x_refsource_FULLDISC | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392 | x_refsource_MISC | |
http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T14:09:17.443Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2017:2459", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2459", }, { name: "DSA-3929", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2017/dsa-3929", }, { name: "100258", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/100258", }, { name: "20201204 ProCaster LE-32F430 SmartTV RCE via libsoup/2.51.3 stack overflow (CVE-2017-2885)", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2020/Dec/3", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "libsoup", vendor: "GNOME", versions: [ { status: "affected", version: "2.58", }, ], }, ], datePublic: "2017-08-10T00:00:00", descriptions: [ { lang: "en", value: "An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { description: "buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-04-19T18:24:10", orgId: "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", shortName: "talos", }, references: [ { name: "RHSA-2017:2459", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:2459", }, { name: "DSA-3929", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2017/dsa-3929", }, { name: "100258", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/100258", }, { name: "20201204 ProCaster LE-32F430 SmartTV RCE via libsoup/2.51.3 stack overflow (CVE-2017-2885)", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2020/Dec/3", }, { tags: [ "x_refsource_MISC", ], url: "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "talos-cna@cisco.com", DATE_PUBLIC: "2017-08-10T00:00:00", ID: "CVE-2017-2885", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "libsoup", version: { version_data: [ { version_value: "2.58", }, ], }, }, ], }, vendor_name: "GNOME", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.", }, ], }, impact: { cvss: { baseScore: 9.8, baseSeverity: "Critical", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2017:2459", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:2459", }, { name: "DSA-3929", refsource: "DEBIAN", url: "https://www.debian.org/security/2017/dsa-3929", }, { name: "100258", refsource: "BID", url: "http://www.securityfocus.com/bid/100258", }, { name: "20201204 ProCaster LE-32F430 SmartTV RCE via libsoup/2.51.3 stack overflow (CVE-2017-2885)", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2020/Dec/3", }, { name: "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392", refsource: "MISC", url: "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392", }, { name: "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", assignerShortName: "talos", cveId: "CVE-2017-2885", datePublished: "2018-04-24T19:00:00Z", dateReserved: "2016-12-01T00:00:00", dateUpdated: "2024-09-17T03:32:40.423Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2012-2132
Vulnerability from cvelistv5
Published
2012-08-20 18:00
Modified
2024-08-06 19:26
Severity ?
EPSS score ?
Summary
libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/04/24/13 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/53232 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2012/04/24/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2012/04/30/7 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75167 | vdb-entry, x_refsource_XF | |
http://www.openwall.com/lists/oss-security/2012/05/02/8 | mailing-list, x_refsource_MLIST | |
https://bugzilla.gnome.org/show_bug.cgi?id=666280 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T19:26:08.201Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20120424 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2012/04/24/13", }, { name: "53232", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/53232", }, { name: "[oss-security] 20120424 CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2012/04/24/3", }, { name: "[oss-security] 20120430 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2012/04/30/7", }, { name: "libsoup-ssl-poofing(75167)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167", }, { name: "[oss-security] 20120502 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2012/05/02/8", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=666280", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2011-12-15T00:00:00", descriptions: [ { lang: "en", value: "libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-28T12:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "[oss-security] 20120424 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2012/04/24/13", }, { name: "53232", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/53232", }, { name: "[oss-security] 20120424 CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2012/04/24/3", }, { name: "[oss-security] 20120430 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2012/04/30/7", }, { name: "libsoup-ssl-poofing(75167)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167", }, { name: "[oss-security] 20120502 Re: CVE Request: libsoup 2.32.2 sets ssl trusted flag despite no verification", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2012/05/02/8", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=666280", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2012-2132", datePublished: "2012-08-20T18:00:00", dateReserved: "2012-04-04T00:00:00", dateUpdated: "2024-08-06T19:26:08.201Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2018-04-24 19:29
Modified
2024-11-21 03:24
Severity ?
Summary
An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | libsoup | 2.58 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.5 | |
redhat | enterprise_linux_server_tus | 7.4 | |
redhat | enterprise_linux_workstation | 7.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnome:libsoup:2.58:*:*:*:*:*:*:*", matchCriteriaId: "4BD5FB77-9583-4CFE-858A-774344AE8222", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", matchCriteriaId: "D99A687E-EAE6-417E-A88E-D0082BC194CD", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", matchCriteriaId: "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", matchCriteriaId: "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", matchCriteriaId: "D5F7E11E-FB34-4467-8919-2B6BEAABF665", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.", }, { lang: "es", value: "Existe una vulnerabilidad explotable de desbordamiento de búfer basado en pila en GNOME libsoup 2.58. Una petición HTTP especialmente manipulada puede provocar un desbordamiento de pila que daría lugar a la ejecución remota de código. Un atacante puede enviar una petición HTTP especial al servidor vulnerable para desencadenar esta vulnerabilidad.", }, ], id: "CVE-2017-2885", lastModified: "2024-11-21T03:24:23.510", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "talos-cna@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-24T19:29:02.783", references: [ { source: "talos-cna@cisco.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html", }, { source: "talos-cna@cisco.com", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2020/Dec/3", }, { source: "talos-cna@cisco.com", tags: [ "Broken Link", ], url: "http://www.securityfocus.com/bid/100258", }, { source: "talos-cna@cisco.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2459", }, { source: "talos-cna@cisco.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2017/dsa-3929", }, { source: "talos-cna@cisco.com", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2020/Dec/3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.securityfocus.com/bid/100258", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2459", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2017/dsa-3929", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392", }, ], sourceIdentifier: "talos-cna@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-06-04 14:29
Modified
2024-11-21 03:43
Severity ?
Summary
WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugs.webkit.org/show_bug.cgi?id=126384 | Issue Tracking, Patch, Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201808-04 | ||
cve@mitre.org | https://trac.webkit.org/changeset/228088/webkit | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.webkit.org/show_bug.cgi?id=126384 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201808-04 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://trac.webkit.org/changeset/228088/webkit | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
webkitgtk | webkitgtk\+ | * | |
gnome | libsoup | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*", matchCriteriaId: "65C019E7-FCF0-4D07-8027-E88E8C38BACE", versionEndExcluding: "2.20.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*", matchCriteriaId: "036A3669-4E94-4183-889D-3C2DFBFA72BD", versionEndExcluding: "2.62.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.", }, { lang: "es", value: "WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp en el backend de red de WebKit, tal y como se emplea en WebKitGTK+ en versiones anteriores a la 2.20.0 o sin libsoup 2.62.0, falló inesperadamente a la hora de emplear las opciones de proxy del sistema para las conexiones WebSocket. Como resultado, los usuarios pueden perder su anonimato mediante sitios web manipulados a los que se accede a través de una conexión WebSocket.", }, ], id: "CVE-2018-11713", lastModified: "2024-11-21T03:43:52.770", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-06-04T14:29:00.453", references: [ { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugs.webkit.org/show_bug.cgi?id=126384", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201808-04", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://trac.webkit.org/changeset/228088/webkit", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugs.webkit.org/show_bug.cgi?id=126384", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201808-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://trac.webkit.org/changeset/228088/webkit", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2012-08-20 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnome:libsoup:2.32.2:*:*:*:*:*:*:*", matchCriteriaId: "92398648-8754-4130-BA90-A54838AFA159", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.", }, { lang: "es", value: "libsoup v2.32.2 y anteriores no valida los certificados o elimina el indicador de 'confiable' cuando el archivo ssl-ca-file no existe, lo que permite a atacantes remotos evitar la autenticación mediante el uso de una conexión SSL.\r\n", }, ], id: "CVE-2012-2132", lastModified: "2025-04-11T00:51:21.963", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2012-08-20T18:55:03.043", references: [ { source: "secalert@redhat.com", url: "http://www.openwall.com/lists/oss-security/2012/04/24/13", }, { source: "secalert@redhat.com", url: "http://www.openwall.com/lists/oss-security/2012/04/24/3", }, { source: "secalert@redhat.com", url: "http://www.openwall.com/lists/oss-security/2012/04/30/7", }, { source: "secalert@redhat.com", url: "http://www.openwall.com/lists/oss-security/2012/05/02/8", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/53232", }, { source: "secalert@redhat.com", url: "https://bugzilla.gnome.org/show_bug.cgi?id=666280", }, { source: "secalert@redhat.com", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2012/04/24/13", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2012/04/24/3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2012/04/30/7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2012/05/02/8", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/53232", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.gnome.org/show_bug.cgi?id=666280", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-07-05 18:29
Modified
2024-11-21 03:46
Severity ?
Summary
The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | libsoup | 2.63.2 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
canonical | ubuntu_linux | 18.04 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | ansible_tower | 3.3 | |
redhat | openshift_container_platform | 3.11 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
opensuse | leap | 15.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*", matchCriteriaId: "0CEB94C1-04C2-4A43-A95F-BB8EDF707DB2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*", matchCriteriaId: "A5319543-0143-4E2E-AA77-B7F116C1336C", vulnerable: true, }, { criteria: "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", matchCriteriaId: "2F87326E-0B56-4356-A889-73D026DB1D4B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", matchCriteriaId: "F1E78106-58E6-4D59-990F-75DA575BFAD9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.", }, { lang: "es", value: "La función get_cookies en soup-cookie-jar.c en libsoup 2.63.2 permite que los atacantes provoquen un impacto no especificado mediante un nombre de host vacío.", }, ], id: "CVE-2018-12910", lastModified: "2024-11-21T03:46:05.220", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-05T18:29:00.423", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHBA-2019:0327", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3140", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", "Vendor Advisory", ], url: "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/libsoup/issues/3", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3701-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4241", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHBA-2019:0327", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3140", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", "Vendor Advisory", ], url: "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/libsoup/issues/3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3701-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4241", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-06 22:15
Modified
2024-11-21 04:31
Severity ?
Summary
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | libsoup | * | |
gnome | libsoup | * | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*", matchCriteriaId: "82D58806-8762-4FD9-9658-6C4809D1E432", versionEndExcluding: "2.66.4", versionStartIncluding: "2.65.1", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*", matchCriteriaId: "73D27E8B-ABB1-436E-85B8-A692C8237393", versionEndIncluding: "2.68.1", versionStartIncluding: "2.67.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", matchCriteriaId: "CD783B0C-9246-47D9-A937-6144FE8BFF0F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.", }, { lang: "es", value: "libsoup desde las versiones 2.65.1 hasta 2.68.1 presenta una lectura excesiva de búfer en la región heap de la memoria porque la función soup_ntlm_parse_challenge() en el archivo soup-auth-ntlm.c no comprueba apropiadamente la longitud de un mensaje NTLM antes del procesamiento con una memcpy.", }, ], id: "CVE-2019-17266", lastModified: "2024-11-21T04:31:59.397", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-06T22:15:10.367", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad", }, { source: "cve@mitre.org", tags: [ "Broken Link", "Issue Tracking", "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/libsoup/issues/173", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security-tracker.debian.org/tracker/CVE-2019-17266", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4152-1/", }, { source: "cve@mitre.org", url: "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Issue Tracking", "Third Party Advisory", ], url: "https://gitlab.gnome.org/GNOME/libsoup/issues/173", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security-tracker.debian.org/tracker/CVE-2019-17266", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4152-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2011-08-31 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*", matchCriteriaId: "8C5DD5AB-8CB2-4B2E-AE93-3754085845ED", versionEndIncluding: "2.35.3", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.0:*:*:*:*:*:*:*", matchCriteriaId: "99EFB489-06D8-402D-8470-38551BCB2FC6", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2:*:*:*:*:*:*:*", matchCriteriaId: "B1C82429-BB29-49E7-ADFA-EED16ED7AFC8", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.0:*:*:*:*:*:*:*", matchCriteriaId: "9B9D7017-F606-4466-8F9A-817C6862AD95", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "3619C616-7DAB-4035-9D23-2F2336954DBB", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "E672080A-06D2-4C2C-B3D1-BE679D5649BF", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "6B1B4616-3889-41B6-870F-37DC78A153FA", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "2E1E613A-B333-4E96-90BA-A2AD4363DEB8", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "8EEDB4A8-5593-47C3-92F3-F91476C0D4F1", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.6:*:*:*:*:*:*:*", matchCriteriaId: "FD001D38-16AB-4AFB-9DC6-F7A340436E2B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "6D5398E1-3FB1-4BEA-9278-F9C041A34BD2", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.7:*:*:*:*:*:*:*", matchCriteriaId: "C03F3575-9B90-419C-A5A5-5535F537F096", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.91:*:*:*:*:*:*:*", matchCriteriaId: "467EDDA7-DA81-4DC5-815F-9D1B394CB02F", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.92:*:*:*:*:*:*:*", matchCriteriaId: "63FE3D88-0596-479B-8E38-E47C7FA04397", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.93:*:*:*:*:*:*:*", matchCriteriaId: "BF7DEA94-7E9C-457B-B095-66CC23E9681F", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.94:*:*:*:*:*:*:*", matchCriteriaId: "0F806A86-1250-49EE-992A-09574191D087", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.95.1:*:*:*:*:*:*:*", matchCriteriaId: "E72DA717-D352-4DCB-BBF9-231284B945F8", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.96:*:*:*:*:*:*:*", matchCriteriaId: "19FD71C4-0D7E-4E32-ABFB-35D2943AFC5C", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.97:*:*:*:*:*:*:*", matchCriteriaId: "3AE675A3-B03B-4417-8671-F289604C2291", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.98:*:*:*:*:*:*:*", matchCriteriaId: "5AE3AD41-FAEA-41CE-8317-89E76BE9FE68", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.99:*:*:*:*:*:*:*", matchCriteriaId: "0DD23A95-C65E-4C2E-BAAC-0D8364A1DBF8", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.100:*:*:*:*:*:*:*", matchCriteriaId: "969CB6C0-AD9B-4F48-B77A-0BE3F56B0B22", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.101:*:*:*:*:*:*:*", matchCriteriaId: "95B2D824-7560-4779-A844-07D86C2CCAAB", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.102:*:*:*:*:*:*:*", matchCriteriaId: "EBCC06A9-A79D-4CB2-ADCD-AC1987E2790B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.103:*:*:*:*:*:*:*", matchCriteriaId: "25DE1614-7F35-4484-BE88-F9C4D9935EC1", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.2.104:*:*:*:*:*:*:*", matchCriteriaId: "1756B5C1-18E1-4C6D-89AD-17432B29EBB9", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "22EA54CB-F7C9-4B17-9118-BA335B9E8D46", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "0C43A424-B38A-4819-AFC3-3532C447DF9F", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "3C994C81-6B80-47E8-AD70-B2DC7BF12209", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "FC08FAE6-B41F-41B8-B819-F582DBEA918A", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6D6E08FA-E647-42B7-A033-806DAC1F4951", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.23.1:*:*:*:*:*:*:*", matchCriteriaId: "2752C2FA-7627-4488-88A5-5E6F76FC8F3D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.23.6:*:*:*:*:*:*:*", matchCriteriaId: "1F4AE3DE-5379-47A0-9BDC-AB49323F85C1", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.23.91:*:*:*:*:*:*:*", matchCriteriaId: "896575A0-8B7B-43BE-A653-0BEF54E3049B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.23.92:*:*:*:*:*:*:*", matchCriteriaId: "A02CCE6B-C774-4D9C-AD88-69D24651E1F0", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.24.0.1:*:*:*:*:*:*:*", matchCriteriaId: "9299BB6F-DF57-427C-A0D0-7F872810420B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.24.1:*:*:*:*:*:*:*", matchCriteriaId: "BEB94071-AB85-412E-A31B-29FD8189484D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.25.2:*:*:*:*:*:*:*", matchCriteriaId: "0BC56735-58B1-4780-ABA9-32501C24B56F", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.25.3:*:*:*:*:*:*:*", matchCriteriaId: "72B7C474-9C79-4C1F-B0A3-A5780F87379A", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.25.4:*:*:*:*:*:*:*", matchCriteriaId: "BF3B6CBD-5F44-4FC6-83B7-41134055D1AB", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.25.5:*:*:*:*:*:*:*", matchCriteriaId: "832089BA-670E-40E1-A812-164F13FE29C1", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.25.91:*:*:*:*:*:*:*", matchCriteriaId: "6C76B162-8BCC-43A9-A00B-BEDC16F02C2E", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.26.0:*:*:*:*:*:*:*", matchCriteriaId: "42B5A587-2F23-42CB-BE0F-1F5A4E96AD06", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.26.1:*:*:*:*:*:*:*", matchCriteriaId: "C713940D-24D7-429F-B961-E3E1651F30C9", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.27.1:*:*:*:*:*:*:*", matchCriteriaId: "4C537C96-A138-4D5D-A657-E04D3E2B04AB", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.27.2:*:*:*:*:*:*:*", matchCriteriaId: "6C5EFE4E-ED20-4CB2-B0DE-D7A726F26221", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.27.4:*:*:*:*:*:*:*", matchCriteriaId: "99340F6B-F033-497F-AD66-655504495CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.27.5:*:*:*:*:*:*:*", matchCriteriaId: "7DFE407F-7F02-4E08-9242-41E51A436F1D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.27.90:*:*:*:*:*:*:*", matchCriteriaId: "A838EB16-BC34-4747-84E6-FD31718BC708", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.27.91:*:*:*:*:*:*:*", matchCriteriaId: "EB6F6369-34FD-47D2-A829-BB36CBAAA99A", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.27.92:*:*:*:*:*:*:*", matchCriteriaId: "054A96BA-6584-4D6B-AEB5-FE12209E5C69", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.28.0:*:*:*:*:*:*:*", matchCriteriaId: "0FAB459F-29F5-4AD9-95F4-95F5D05FE91B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.28.1:*:*:*:*:*:*:*", matchCriteriaId: "9FFD7530-6548-4A91-9A0A-F80429368E4B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.29.3:*:*:*:*:*:*:*", matchCriteriaId: "0B48661A-D82E-49D7-917C-3D6A3A7CE116", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.29.5:*:*:*:*:*:*:*", matchCriteriaId: "BA0FA486-3657-48DC-9E10-11EE8A1458B7", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.29.6:*:*:*:*:*:*:*", matchCriteriaId: "15F7CFA6-628D-4CF5-93EB-55519CF955EB", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.29.90:*:*:*:*:*:*:*", matchCriteriaId: "5D1878C5-80C7-4DC2-987C-1BC52E63A8C4", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.29.91:*:*:*:*:*:*:*", matchCriteriaId: "7D7E6439-AC14-4D45-BC73-C0BF7E79BE9D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.30.0:*:*:*:*:*:*:*", matchCriteriaId: "C2E158D5-987A-4F93-82A0-CF74527CA210", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.30.1:*:*:*:*:*:*:*", matchCriteriaId: "CE0D94D2-D74A-448F-9DF5-4B4C23138E0A", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.31.2:*:*:*:*:*:*:*", matchCriteriaId: "0D363498-6F1D-4EEF-853D-905F1D95E62D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.31.6:*:*:*:*:*:*:*", matchCriteriaId: "981AF805-9646-4913-B274-1969AFACC734", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.31.90:*:*:*:*:*:*:*", matchCriteriaId: "C1197161-E084-4485-BA72-B60C07469680", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.31.92:*:*:*:*:*:*:*", matchCriteriaId: "F9E91156-537E-4885-87C2-EC4BA8C2B306", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.32.0:*:*:*:*:*:*:*", matchCriteriaId: "9130A56A-2995-455A-8A51-1A0A85F3D38E", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.32.1:*:*:*:*:*:*:*", matchCriteriaId: "F3A81CD2-1192-4F9E-8BF4-BF86445E11AA", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.32.2:*:*:*:*:*:*:*", matchCriteriaId: "92398648-8754-4130-BA90-A54838AFA159", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.33.4:*:*:*:*:*:*:*", matchCriteriaId: "C536F346-4B27-4A53-A942-68531D9991A0", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.33.5:*:*:*:*:*:*:*", matchCriteriaId: "8F602177-543B-4A42-92C1-53F1573518FD", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.33.6:*:*:*:*:*:*:*", matchCriteriaId: "8011A42F-B7EF-44F2-BE9A-E2543EB1C808", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.33.90:*:*:*:*:*:*:*", matchCriteriaId: "EC3501F1-B153-4870-A7A4-741ACA848656", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.33.92:*:*:*:*:*:*:*", matchCriteriaId: "398B638B-9879-403D-9F55-59FCC8CE3F31", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.34.0:*:*:*:*:*:*:*", matchCriteriaId: "A16CBF8D-7411-4E16-81B0-47696F036C35", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:libsoup:2.34.1:*:*:*:*:*:*:*", matchCriteriaId: "4AC22BA2-D63A-48F8-BF0F-90D664EA6856", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.", }, { lang: "es", value: "Una vulnerabilidad de salto de directorio en la soup-uri.c en SoupServer en libsoup antes de v2.35.4 permite a atacantes remotos leer archivos de su elección a través de un %2e%2e (punto punto) en la URI.", }, ], id: "CVE-2011-2524", lastModified: "2025-04-11T00:51:21.963", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2011-08-31T23:55:02.957", references: [ { source: "secalert@redhat.com", url: "http://git.gnome.org/browse/libsoup/tree/NEWS", }, { source: "secalert@redhat.com", url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/47299", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2011/dsa-2369", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2011-1102.html", }, { source: "secalert@redhat.com", url: "http://www.securitytracker.com/id?1025864", }, { source: "secalert@redhat.com", url: "http://www.ubuntu.com/usn/USN-1181-1", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=653258", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://git.gnome.org/browse/libsoup/tree/NEWS", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/47299", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2011/dsa-2369", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2011-1102.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id?1025864", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-1181-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://bugzilla.gnome.org/show_bug.cgi?id=653258", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }