CVE-2020-12695
Published: 8 June 2020
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
Priority
Status
Package | Release | Status |
---|---|---|
wpa Launchpad, Ubuntu, Debian |
groovy |
Released
(2:2.9-1ubuntu8.1)
|
hirsute |
Released
(2:2.9-1ubuntu10)
|
|
jammy |
Released
(2:2.9-1ubuntu10)
|
|
kinetic |
Released
(2:2.9-1ubuntu10)
|
|
bionic |
Released
(2:2.6-15ubuntu2.7)
|
|
eoan |
Ignored
(end of life)
|
|
focal |
Released
(2:2.9-1ubuntu4.2)
|
|
impish |
Released
(2:2.9-1ubuntu10)
|
|
lunar |
Released
(2:2.9-1ubuntu10)
|
|
trusty |
Released
(2.1-0ubuntu1.7+esm3)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Needs triage
|
|
xenial |
Released
(2.4-0ubuntu6.7)
|
|
Patches: upstream: https://w1.fi/security/2020-1/0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch upstream: https://w1.fi/security/2020-1/0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch upstream: https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch |
||
Binaries built from this source package are in Universe and so are supported by the community. | ||
gupnp Launchpad, Ubuntu, Debian |
hirsute |
Not vulnerable
(1.2.3-1)
|
trusty |
Does not exist
|
|
xenial |
Needed
|
|
upstream |
Released
(1.2.3-1)
|
|
bionic |
Needed
|
|
focal |
Released
(1.2.3-0ubuntu0.20.04.1)
|
|
groovy |
Not vulnerable
(1.2.3-1)
|
|
jammy |
Not vulnerable
(1.2.3-1)
|
|
kinetic |
Not vulnerable
(1.2.3-1)
|
|
impish |
Not vulnerable
(1.2.3-1)
|
|
lunar |
Not vulnerable
(1.2.3-1)
|
|
minidlna Launchpad, Ubuntu, Debian |
upstream |
Released
(1.3.0)
|
trusty |
Does not exist
|
|
hirsute |
Not vulnerable
(1.2.1+dfsg-3)
|
|
bionic |
Released
(1.2.1+dfsg-1ubuntu0.18.04.1)
|
|
focal |
Released
(1.2.1+dfsg-1ubuntu0.20.04.1)
|
|
groovy |
Released
(1.2.1+dfsg-2ubuntu0.1)
|
|
xenial |
Released
(1.1.5+dfsg-2ubuntu0.1)
|
|
jammy |
Not vulnerable
(1.2.1+dfsg-3)
|
|
kinetic |
Not vulnerable
(1.2.1+dfsg-3)
|
|
impish |
Not vulnerable
(1.2.1+dfsg-3)
|
|
lunar |
Not vulnerable
(1.2.1+dfsg-3)
|
|
libupnp Launchpad, Ubuntu, Debian |
bionic |
Needed
|
xenial |
Needed
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
lunar |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
pupnp-1.8 Launchpad, Ubuntu, Debian |
jammy |
Needed
|
impish |
Ignored
(end of life)
|
|
kinetic |
Ignored
(end of life, was needed)
|
|
bionic |
Needed
|
|
focal |
Needed
|
|
groovy |
Ignored
(end of life)
|
|
hirsute |
Ignored
(end of life)
|
|
lunar |
Needed
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
Patches: upstream: https://github.com/pupnp/pupnp/pull/181/commits/5f76bf2858dd601bd985bf37a1db9f262c0ff7bf upstream: https://github.com/pupnp/pupnp/commit/7b3f0f5f497f9f493c82307af495b87fa9ebdacb upstream: https://github.com/pupnp/pupnp/commit/bf66031c5455c94391dd12d297c251112c64e46d |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Changed |
Confidentiality | Low |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12695
- https://w1.fi/security/2020-1/
- https://w1.fi/security/2020-1/upnp-subscribe-misbehavior-wps-ap.txt
- https://www.openwall.com/lists/oss-security/2020/06/08/2
- https://ubuntu.com/security/notices/USN-4494-1
- https://ubuntu.com/security/notices/USN-4722-1
- https://ubuntu.com/security/notices/USN-4734-1
- https://ubuntu.com/security/notices/USN-4734-2
- NVD
- Launchpad
- Debian