Gentoo Linux Security Advisory 201403-6 - Multiple buffer overflow flaws in libupnp may allow execution of arbitrary code. Versions less than 1.6.18 are affected.
e03eb83d2a7aa7021aa08869a4d96954a3dadcdfda9b744e73250ff73718e8e7
Mandriva Linux Security Advisory 2013-098 - The Portable SDK for UPnP Devices libupnp library contains multiple buffer overflow vulnerabilities. Devices that use libupnp may also accept UPnP queries over the WAN interface, therefore exposing the vulnerabilities to the internet.
f8496243e7f0256fe58f41cd2454656be93b6bfe7cf9d3facfeb6bad9b7497eb
Debian Linux Security Advisory 2615-1 - Multiple stack-based buffer overflows were discovered in libupnp4, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function.
3995c96856b81fca48ddb36fae97e693b485b9655d4843a24796b07552595498
Debian Linux Security Advisory 2614-1 - Multiple stack-based buffer overflows were discovered in libupnp, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function.
8b4ec6bd7b11036ad78a8dda85124db58bbe331d1cd2fee2af1493bd0aefc13d