CVE-2017-9765

CVSS V2 Medium 6.8 CVSS V3 High 8.1
Description
Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. NOTE: the large document would be blocked by many common web-server configurations on general-purpose computers.
Overview
  • CVE ID
  • CVE-2017-9765
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2017-07-20T00:29:00
  • Last Modified Date
  • 2017-09-16T10:25:24
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:genivia:gsoap:2.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.7.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.29:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.32:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.33:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.34:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.35:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.36:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.37:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.38:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.39:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.40:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.41:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.42:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.43:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.44:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.45:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.46:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:genivia:gsoap:2.8.47:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.1
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.2
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://www.genivia.com/changelog.html#Version_2.8.48_upd_%2806/21/2017%29 Release Notes Vendor Advisory
https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_%28June_21,_2017%29 Patch Vendor Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1049348 Issue Tracking Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1472807 Issue Tracking Third Party Advisory VDB Entry
http://blog.senr.io/devilsivy.html Exploit Technical Description Third Party Advisory
http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions Mitigation Technical Description Third Party Advisory
http://www.securityfocus.com/bid/99868 Third Party Advisory VDB Entry
History
Created Old Value New Value Data Type Notes
2022-05-10 08:37:14 Added to TrackCVE
2022-12-02 18:53:15 2017-07-20T00:29Z 2017-07-20T00:29:00 CVE Published Date updated
2022-12-02 18:53:15 2017-09-16T10:25:24 CVE Modified Date updated
2022-12-02 18:53:15 Analyzed Vulnerability Status updated