ReadyMedia (aka MiniDLNA) before versions 1.3.0 allows remote code execution. Sending a malicious UPnP HTTP request to the miniDLNA service using HTTP chunked encoding can lead to a signedness bug resulting in a buffer overflow in calls to memcpy/memmove.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://sourceforge.net/projects/minidlna/ | third party advisory |
https://www.rootshellsecurity.net/remote-heap-corruption-bug-discovery-minidlna/ | third party advisory exploit |
https://www.debian.org/security/2020/dsa-4806 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html | third party advisory mailing list |