Hash: SHA512

Package        : gsoap
Version        : 2.8.7-2+deb7u1
CVE ID         : CVE-2017-9765

A vulnerability was discovered in gsoap, a library for the development
of SOAP web services and clients, that may be exposed with a large and
specific XML message over 2 GB in size. After receiving this 2 GB
message, a buffer overflow can cause an open unsecured server to crash.
Clients communicating with HTTPS with trusted servers are not affected.

For Debian 7 "Wheezy", these problems have been fixed in version
2.8.7-2+deb7u1.

We recommend that you upgrade your gsoap packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-1036-1: gsoap security update

July 24, 2017
A vulnerability was discovered in gsoap, a library for the development of SOAP web services and clients, that may be exposed with a large and specific XML message over 2 GB in size

Summary

For Debian 7 "Wheezy", these problems have been fixed in version
2.8.7-2+deb7u1.

We recommend that you upgrade your gsoap packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : gsoap
Version : 2.8.7-2+deb7u1
CVE ID : CVE-2017-9765

Related News