Ubuntu 3059-1: xmlrpc-epi vulnerability

    Date10 Aug 2016
    CategoryUbuntu
    49
    Posted ByLinuxSecurity Advisories
    xmlrpc-epi could be made to crash or run programs if it processed specially crafted data.
    ==========================================================================
    Ubuntu Security Notice USN-3059-1
    August 10, 2016
    
    xmlrpc-epi vulnerability
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 16.04 LTS
    
    Summary:
    
    xmlrpc-epi could be made to crash or run programs if it processed specially
    crafted data.
    
    Software Description:
    - xmlrpc-epi: a XML-RPC request library
    
    Details:
    
    It was discovered that xmlrpc-epi incorrectly handled lengths in the
    simplestring_addn function. A remote attacker could use this issue to cause
    applications using xmlrpc-epi such as PHP to crash, resulting in a denial
    of service, or possibly execute arbitrary code.
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 16.04 LTS:
      libxmlrpc-epi0                  0.54.2-1.1ubuntu0.1
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-3059-1
      CVE-2016-6296
    
    Package Information:
      https://launchpad.net/ubuntu/+source/xmlrpc-epi/0.54.2-1.1ubuntu0.1
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.