CVE-2017-9765

Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. NOTE: the large document would be blocked by many common web-server configurations on general-purpose computers.

MISC: http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions
MISC: http://blog.senr.io/devilsivy.html
MISC: https://bugzilla.redhat.com/show_bug.cgi?id=1472807
MISC: https://bugzilla.suse.com/show_bug.cgi?id=1049348
MISC: https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_(June_21
MISC: https://www.genivia.com/changelog.html#Version_2.8.48_upd_(06/21/2017)
BID: http://www.securityfocus.com/bid/99868
CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9765

14 years
257 countries
685k users
4536k calculations
Logo www.cctvforum.com
Logo www.inv-technology.com
Logo www.power-shop.gr
Logo www.eleksys.cz
Logo ru.kedacom.com
Logo www.use-ip.co.uk