CVE-2020-12695
Published: 08 June 2020
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
gupnp Launchpad, Ubuntu, Debian |
Upstream |
Released
(1.2.3-1)
|
Ubuntu 21.04 (Hirsute Hippo) |
Not vulnerable
(1.2.3-1)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(1.2.3-1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(1.2.3-0ubuntu0.20.04.1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Needed
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needed
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
libupnp Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Does not exist
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Needed
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needed
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
minidlna Launchpad, Ubuntu, Debian |
Upstream |
Released
(1.3.0)
|
Ubuntu 21.04 (Hirsute Hippo) |
Not vulnerable
(1.2.1+dfsg-3)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(1.2.1+dfsg-2ubuntu0.1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(1.2.1+dfsg-1ubuntu0.20.04.1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1.2.1+dfsg-1ubuntu0.18.04.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1.1.5+dfsg-2ubuntu0.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
pupnp-1.8 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Needed
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Needed
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Needed
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Needed
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Patches: Upstream: https://github.com/pupnp/pupnp/pull/181/commits/5f76bf2858dd601bd985bf37a1db9f262c0ff7bf Upstream: https://github.com/pupnp/pupnp/commit/7b3f0f5f497f9f493c82307af495b87fa9ebdacb Upstream: https://github.com/pupnp/pupnp/commit/bf66031c5455c94391dd12d297c251112c64e46d |
||
wpa Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Released
(2:2.9-1ubuntu10)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(2:2.9-1ubuntu8.1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(2:2.9-1ubuntu4.2)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(2:2.6-15ubuntu2.7)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(2.4-0ubuntu6.7)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(2.1-0ubuntu1.7+esm3)
|
|
Patches: Upstream: https://w1.fi/security/2020-1/0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch Upstream: https://w1.fi/security/2020-1/0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch Upstream: https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch |
||
Binaries built from this source package are in Universe and so are supported by the community. |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12695
- https://w1.fi/security/2020-1/
- https://w1.fi/security/2020-1/upnp-subscribe-misbehavior-wps-ap.txt
- https://www.openwall.com/lists/oss-security/2020/06/08/2
- https://usn.ubuntu.com/usn/usn-4494-1
- https://usn.ubuntu.com/usn/usn-4722-1
- https://usn.ubuntu.com/usn/usn-4734-1
- https://usn.ubuntu.com/usn/usn-4734-2
- NVD
- Launchpad
- Debian