CVE-2017-9765 — Integer Overflow or Wraparound in Gsoap
Severity
8.1HIGHNVD
EPSS
9.1%
top 7.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 20
Latest updateMay 17
Description
Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. NOTE: the large document would be blocked by many common web-server configurations on general-purpose computers.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
3📋Vendor Advisories
1Debian▶
CVE-2017-9765: gsoap - Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x befor...↗2017
💬Community
3Bugzilla▶
CVE-2017-9765 gsoap: Stack-based buffer overflow when receieving XML message with size larger than 2GB↗2017-07-19
Bugzilla▶
CVE-2017-9765 gsoap: Stack-based buffer overflow when receieving XML message with size larger than 2GB [fedora-all]↗2017-07-19
Bugzilla▶
CVE-2017-9765 gsoap: Stack-based buffer overflow when receieving XML message with size larger than 2GB [epel-all]↗2017-07-19