CVE-2019-14323
28.07.2019, 13:15
SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c.Enginsight
Vendor | Product | Version |
---|---|---|
simple_service_discovery_protocol_responder_project | simple_service_discovery_protocol_responder | 1.0 ≤ 𝑥 ≤ 1.5 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration