Bug 905820 - US-CERT Vulnerability Note VU#922681 - Libupnp must be updated to ver. 1.6.18
Summary: US-CERT Vulnerability Note VU#922681 - Libupnp must be updated to ver. 1.6.18
Keywords:
Status: CLOSED DUPLICATE of bug 905577
Alias: None
Product: Fedora
Classification: Fedora
Component: libupnp
Version: 18
Hardware: All
OS: All
unspecified
urgent
Target Milestone: ---
Assignee: Adam Jackson
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-01-30 08:55 UTC by TheDuke
Modified: 2018-04-11 08:27 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-01-30 15:20:03 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description TheDuke 2013-01-30 08:55:48 UTC
Description of problem:
note taken from US-CERT.gov website:
"Multiple vulnerabilities have been announced in libupnp, the open source portable SDK for UPnP devices. Libupnp is employed by hundreds of vendors for UPnP-enabled devices. Information is also available in CERT Vulnerability Note VU#922681.

US-CERT recommends that affected UPnP device vendors and developers obtain and employ libupnp version 1.6.18, which addresses these vulnerabilities.

US-CERT recommends that users and administrators review CERT Vulnerability Note VU#922681, disable UPnP (if possible), and restrict access to SSDP (1900/udp) and Simple Object Access Protocol (SOAP) services from untrusted networks such as the Internet."
source: http://www.us-cert.gov/current/#cert_releases_upnp_security_advisory

So, libupnp needs to be updated to the latest version (1.6.18)

Version-Release number of selected component (if applicable):
1.6.17

How reproducible:


Steps to Reproduce:
1.
2.
3.
  
Actual results:


Expected results:


Additional info:

Comment 1 Vincent Danen 2013-01-30 15:20:03 UTC

*** This bug has been marked as a duplicate of bug 905577 ***


Note You need to log in before you can comment on or make changes to this bug.