An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
{
"binaries": [
{
"binary_version": "2.44.2-1ubuntu2.2",
"binary_name": "gir1.2-soup-2.4"
},
{
"binary_version": "2.44.2-1ubuntu2.2",
"binary_name": "libsoup-gnome2.4-1"
},
{
"binary_version": "2.44.2-1ubuntu2.2",
"binary_name": "libsoup-gnome2.4-dev"
},
{
"binary_version": "2.44.2-1ubuntu2.2",
"binary_name": "libsoup2.4-1"
},
{
"binary_version": "2.44.2-1ubuntu2.2",
"binary_name": "libsoup2.4-dev"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "2.52.2-1ubuntu0.2",
"binary_name": "gir1.2-soup-2.4"
},
{
"binary_version": "2.52.2-1ubuntu0.2",
"binary_name": "libsoup-gnome2.4-1"
},
{
"binary_version": "2.52.2-1ubuntu0.2",
"binary_name": "libsoup-gnome2.4-dev"
},
{
"binary_version": "2.52.2-1ubuntu0.2",
"binary_name": "libsoup2.4-1"
},
{
"binary_version": "2.52.2-1ubuntu0.2",
"binary_name": "libsoup2.4-dev"
}
],
"availability": "No subscription required"
}