GNOME UPnP impl, used by Rygel for media sharing on GNOME (standard
Ubuntu) desktop and many other applications
Callstranger Vulnerability - vuln in UPnP protocol - callback header in
UPnP SUBSCRIBE can contain arbitrary delivery URL - so this could be on a
different network segment than the event subscription URL - so you can
SUBSCRIBE to events and supply one or more URLs for delivery of the
messages. Can then make this point anywhere and so can get the device to
send HTTP traffic to any arbitrary destination - and so can be used for
data exfil or DDoS attacks etc. Fixed to check the destination host is
either a link-local address or the address mask matches - either way,
check is on the same network segment.
ruby websockets extension - used regex with backtracking to properly
parse headers, could be sent crafted input which is very computationally
intensive to parse as a result -> CPU based DoS
Perl DB interface - underlying code would potentially allocate the stack
and hence result in invalid pointers to object that were previously on
the stack - could be manipulated by a remote user to result in memory
corruption etc -> crash