Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. NOTE: the large document would be blocked by many common web-server configurations on general-purpose computers.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.8.60-2build1", "binary_name": "gsoap" }, { "binary_version": "2.8.60-2build1", "binary_name": "gsoap-dbgsym" }, { "binary_version": "2.8.60-2build1", "binary_name": "gsoap-doc" }, { "binary_version": "2.8.60-2build1", "binary_name": "libgsoap-2.8.60" }, { "binary_version": "2.8.60-2build1", "binary_name": "libgsoap-2.8.60-dbgsym" }, { "binary_version": "2.8.60-2build1", "binary_name": "libgsoap-dev" } ] }