Rapid7 Vulnerability & Exploit Database

RHSA-2009:0344: libsoup security update

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

RHSA-2009:0344: libsoup security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
03/14/2009
Created
07/25/2018
Added
09/12/2009
Modified
07/04/2017

Description

libsoup is an HTTP client/library implementation for GNOME written in C. Itwas originally part of a SOAP (Simple Object Access Protocol)implementation called Soup, but the SOAP and non-SOAP parts have now beensplit into separate packages.An integer overflow flaw which caused a heap-based buffer overflow wasdiscovered in libsoup's Base64 encoding routine. An attacker could use thisflaw to crash, or, possibly, execute arbitrary code. This arbitrary codewould execute with the privileges of the application using libsoup's Base64routine to encode large, untrusted inputs. (CVE-2009-0585)All users of libsoup and evolution28-libsoup should upgrade to theseupdated packages, which contain a backported patch to resolve this issue.All running applications using the affected library function (such asEvolution configured to connect to the GroupWise back-end) must berestarted for the update to take effect.

Solution(s)

  • redhat-upgrade-evolution28-libsoup
  • redhat-upgrade-evolution28-libsoup-devel
  • redhat-upgrade-libsoup
  • redhat-upgrade-libsoup-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;