MGASA-2021-0321

Source
https://advisories.mageia.org/MGASA-2021-0321.html
Import Source
https://advisories.mageia.org/MGASA-2021-0321.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0321
Related
Published
2021-07-08T22:43:19Z
Modified
2021-07-08T21:26:01Z
Summary
Updated gupnp packages fix a security vulnerability
Details

An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc. (CVE-2021-33516)

References
Credits

Affected packages

Mageia:8 / gupnp

Package

Name
gupnp
Purl
pkg:rpm/mageia/gupnp?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.4-1.1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / gupnp

Package

Name
gupnp
Purl
pkg:rpm/mageia/gupnp?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.3-1.1.mga7

Ecosystem specific

{
    "section": "core"
}