CVE-2023-33476

NameCVE-2023-33476
DescriptionReadyMedia (MiniDLNA) versions from 1.1.15 up to 1.3.2 is vulnerable to Buffer Overflow. The vulnerability is caused by incorrect validation logic when handling HTTP requests using chunked transport encoding. This results in other code later using attacker-controlled chunk values that exceed the length of the allocated buffer, resulting in out-of-bounds read/write.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3465-1, DSA-5434-1
Debian Bugs1037052

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
minidlna (PTS)jessie, jessie (lts)1.1.2+dfsg-1.1+deb8u1vulnerable
stretch (security), stretch (lts), stretch1.1.6+dfsg-1+deb9u2vulnerable
buster (security), buster, buster (lts)1.2.1+dfsg-2+deb10u4fixed
bullseye (security), bullseye1.3.0+dfsg-2+deb11u2fixed
bookworm (security), bookworm1.3.0+dfsg-2.2+deb12u1fixed
sid, trixie1.3.3+dfsg-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
minidlnasourcejessie(unfixed)end-of-life
minidlnasourcestretch(unfixed)end-of-life
minidlnasourcebuster1.2.1+dfsg-2+deb10u4DLA-3465-1
minidlnasourcebullseye1.3.0+dfsg-2+deb11u2DSA-5434-1
minidlnasourcebookworm1.3.0+dfsg-2.2+deb12u1DSA-5434-1
minidlnasource(unstable)1.3.2+dfsg-1.11037052

Notes

https://blog.coffinsec.com/0day/2023/05/31/minidlna-heap-overflow-rca.html
Fixed by: https://sourceforge.net/p/minidlna/git/ci/9bd58553fae5aef3e6dd22f51642d2c851225aec/ (v1_3_3)

Search for package or bug name: Reporting problems