Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. NOTE: the large document would be blocked by many common web-server configurations on general-purpose computers.
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Link | Tags |
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1049348 | third party advisory vdb entry issue tracking |
http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions | mitigation third party advisory technical description |
http://blog.senr.io/devilsivy.html | third party advisory exploit technical description |
https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_%28June_21%2C_2017%29 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1472807 | third party advisory vdb entry issue tracking |
http://www.securityfocus.com/bid/99868 | third party advisory vdb entry |
https://www.genivia.com/changelog.html#Version_2.8.48_upd_%2806/21/2017%29 | release notes vendor advisory |