This software should not be in main. It seems to be very buggy and
dangerous.

- auto-starts a network-listening port on all interfaces
- needlessly runs as root
- off-by-one in packet parsing can trigger crashes on unluckily alignment
    minissdpd.c line ~290
- walk off end of memory without length check in "cache-control" packet
    minissdpd.c line ~314
- spews DEBUG and INFO level syslog lines on device updates/discovery
- unchecked malloc uses
- linefeed injection in service requests
- multiple buffer overflows in processRequest
    - unchecked decoded lengths
    - unchecked buffer creation length
    - integer overflows in decoded lengths
    - write null byte arbitrarily in heap
    - could read stack memory out on requests (including canary if our canary 
wasn't null-started)
        add bogus service with giant "location" entry
        read back with type==1 and matching "st"
- unchecked write lengths (could get interrupted)
- does not clean up /var/run files correctly


** Changed in: minissdpd (Ubuntu)
       Status: Confirmed => Incomplete

** Changed in: minissdpd (Ubuntu)
     Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/813313

Title:
  [mir] minissdpd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/minissdpd/+bug/813313/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to