An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2017:2459 | third party advisory vendor advisory |
https://www.debian.org/security/2017/dsa-3929 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/100258 | vdb entry broken link |
http://seclists.org/fulldisclosure/2020/Dec/3 | mailing list exploit third party advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392 | exploit third party advisory technical description |
http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html | exploit vdb entry third party advisory |