[ASA-202104-8] libupnp: content spoofing

Santiago Torres-Arias santiago at archlinux.org
Thu Apr 29 21:43:31 UTC 2021


Arch Linux Security Advisory ASA-202104-8
=========================================

Severity: High
Date    : 2021-04-29
CVE-ID  : CVE-2021-29462
Package : libupnp
Type    : content spoofing
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1844

Summary
=======

The package libupnp before version 1.14.6-1 is vulnerable to content
spoofing.

Resolution
==========

Upgrade to 1.14.6-1.

# pacman -Syu "libupnp>=1.14.6-1"

The problem has been fixed upstream in version 1.14.6.

Workaround
==========

None.

Description
===========

The server part of pupnp (libupnp) appears to be vulnerable to DNS
rebinding attacks because it does not check the value of the `Host`
header. This can be mitigated by using DNS revolvers which block DNS-
rebinding attacks. The vulnerability is fixed in version 1.14.6 and
later.

Impact
======

An attacker is able to perform a DNS rebinding attack against a client
browser to trigger local UPnP services. This can be used to, for
example, exfiltrate or tamper data of a client.

References
==========

https://github.com/pupnp/pupnp/security/advisories/GHSA-6hqq-w3jq-9fhg
https://github.com/pupnp/pupnp/commit/21fd85815da7ed2578d0de7cac4c433008f0ecd4
https://security.archlinux.org/CVE-2021-29462

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210429/580bf6f9/attachment.sig>


More information about the arch-security mailing list