Ubuntu 3059-1: xmlrpc-epi vulnerability

    Date10 Aug 2016
    Posted ByLinuxSecurity Advisories
    xmlrpc-epi could be made to crash or run programs if it processed specially crafted data.
    Ubuntu Security Notice USN-3059-1
    August 10, 2016
    xmlrpc-epi vulnerability
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 16.04 LTS
    xmlrpc-epi could be made to crash or run programs if it processed specially
    crafted data.
    Software Description:
    - xmlrpc-epi: a XML-RPC request library
    It was discovered that xmlrpc-epi incorrectly handled lengths in the
    simplestring_addn function. A remote attacker could use this issue to cause
    applications using xmlrpc-epi such as PHP to crash, resulting in a denial
    of service, or possibly execute arbitrary code.
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 16.04 LTS:
      libxmlrpc-epi0                  0.54.2-1.1ubuntu0.1
    In general, a standard system update will make all the necessary changes.
    Package Information:

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"90","title":"Love them!","votes":"90","type":"x","order":"1","pct":78.95,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"18","type":"x","order":"2","pct":15.79,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"6","type":"x","order":"3","pct":5.26,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.