MiniDLNA SQL Injection / Buffer Overflow

2013.07.17
Credit: Craig Young
Risk: High
Local: No
Remote: Yes

MiniDLNA prior to v1.1.0 (http://sourceforge.net/projects/minidlna/) is prone to a variety of issues which could be used to take control of a host running this software. CVE-2013-2738 and CVE-2013-2745 are SQL injection issues. CVE-2013-2739 has been assigned for a heap-based buffer overflow which was introduced when they fixed the stack buffer overflow discussed by Zachary Cutlip at Black Hat 2012 & DC20. Link: http://media.blackhat.com/bh-us-12/Briefings/Cutlip/BH_US_12_Cutlip_SQL_Exploitation_WP.pdf These SQL injection vectors are separate from what Cutlip described but they can also be used to retrieve arbitrary files from the system or to stage an overflow payload as is detailed in the above link. I strongly advise anyone using this program to update to the latest version. Kind Regards, Craig Young @CraigTweets

References:

http://sourceforge.net/projects/minidlna/
http://media.blackhat.com/bh-us-12/Briefings/Cutlip/BH_US_12_Cutlip_SQL_Exploitation_WP.pdf


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top