CVE-2017-9765
high-risk
Published 2017-07-20
Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. NOTE: the large document would be blocked by many common web-server configurations on general-purpose computers.
Do I need to act?
~
9.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (20)
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Gsoap
Affected Vendors
References (14)
Third Party Advisory
http://www.securityfocus.com/bid/99868
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1472807
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1049348
Third Party Advisory
http://www.securityfocus.com/bid/99868
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1472807
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1049348
61
/ 100
high-risk
Severity
24/34 · High
Exploitability
10/34 · Low
Exposure
27/34 · High