UBUNTU-CVE-2017-9765

Source
https://ubuntu.com/security/CVE-2017-9765
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-9765.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2017-9765
Upstream
Published
2017-07-20T00:29:00Z
Modified
2025-09-08T16:44:17Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. NOTE: the large document would be blocked by many common web-server configurations on general-purpose computers.

References

Affected packages

Ubuntu:Pro:16.04:LTS / gsoap

Package

Name
gsoap
Purl
pkg:deb/ubuntu/gsoap@2.8.28-1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.8.22-1
2.8.22-2
2.8.28-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.8.28-1",
            "binary_name": "gsoap"
        },
        {
            "binary_version": "2.8.28-1",
            "binary_name": "libgsoap-dev"
        },
        {
            "binary_version": "2.8.28-1",
            "binary_name": "libgsoap8"
        }
    ]
}