CVE-2017-9765
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
20/07/2017
Last modified:
20/04/2025
Description
Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. NOTE: the large document would be blocked by many common web-server configurations on general-purpose computers.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:genivia:gsoap:2.7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:genivia:gsoap:2.7.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions
- http://blog.senr.io/devilsivy.html
- http://www.securityfocus.com/bid/99868
- https://bugzilla.redhat.com/show_bug.cgi?id=1472807
- https://bugzilla.suse.com/show_bug.cgi?id=1049348
- https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_%28June_21%2C_2017%29
- https://www.genivia.com/changelog.html#Version_2.8.48_upd_%2806/21/2017%29
- http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions
- http://blog.senr.io/devilsivy.html
- http://www.securityfocus.com/bid/99868
- https://bugzilla.redhat.com/show_bug.cgi?id=1472807
- https://bugzilla.suse.com/show_bug.cgi?id=1049348
- https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_%28June_21%2C_2017%29
- https://www.genivia.com/changelog.html#Version_2.8.48_upd_%2806/21/2017%29



