LibSoup - (bulletinjan2018)ID: oval:org.secpod.oval:def:2101631 | Date: (C)2019-12-31 (M)2022-10-10 |
Class: PATCH | Family: unix |
An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
Product: |
library/python/python-gtk-vnc-27 |
library/libsoup |
library/desktop/gtk-vnc |
library/desktop/evolution-data-server |
library/c++/obby |
library/c++/net6 |
editor/gobby |
communication/im/pidgin |