A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.
The product performs a calculation to determine how much memory to allocate, but an integer overflow can occur that causes less memory to be allocated than expected, leading to a buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gsoap | Genivia | 2.8.107 (including) | 2.8.107 (including) |
Gsoap | Ubuntu | bionic | * |
Gsoap | Ubuntu | esm-apps/bionic | * |
Gsoap | Ubuntu | esm-apps/focal | * |
Gsoap | Ubuntu | esm-apps/jammy | * |
Gsoap | Ubuntu | focal | * |
Gsoap | Ubuntu | groovy | * |
Gsoap | Ubuntu | hirsute | * |
Gsoap | Ubuntu | impish | * |
Gsoap | Ubuntu | jammy | * |
Gsoap | Ubuntu | kinetic | * |
Gsoap | Ubuntu | trusty | * |
Gsoap | Ubuntu | upstream | * |
Gsoap | Ubuntu | xenial | * |