Login
Newsletter
Werbung

Sicherheit: Denial of Service in Libplist
Aktuelle Meldungen Distributionen
Name: Denial of Service in Libplist
ID: USN-3429-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 17.04
Datum: Di, 26. September 2017, 04:55
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7982
Applikationen: Libplist

Originalnachricht


--===============3547852403054384916==
Content-Type: multipart/signed; micalg="pgp-sha256";
protocol="application/pgp-signature";
boundary="=-DVuuWaezA+nFB0WHv+On"


--=-DVuuWaezA+nFB0WHv+On
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-3429-1
September 25, 2017

libplist vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Libplist could be made to crash if it opened a specially crafted
file.

Software Description:
- libplist: Library for handling Apple binary and XML property lists

Details:

Wang Junjie discovered that Libplist incorrectly handled certain files.
If a user were tricked into opening a crafted file, an attacker could
possibly use this to cause a crash or denial or service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
  libplist-utils                  1.12-3.1ubuntu0.17.04.1
  libplist3                       1.12-3.1ubuntu0.17.04.1
  python-plist                    1.12-3.1ubuntu0.17.04.1

Ubuntu 16.04 LTS:
  libplist-utils                  1.12-3.1ubuntu0.16.04.1
  libplist3                       1.12-3.1ubuntu0.16.04.1
  python-plist                    1.12-3.1ubuntu0.16.04.1

Ubuntu 14.04 LTS:
  libplist-utils                  1.10-1ubuntu0.1
  libplist1                       1.10-1ubuntu0.1
  python-plist                    1.10-1ubuntu0.1

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3429-1
  CVE-2017-7982

Package Information:
  https://launchpad.net/ubuntu/+source/libplist/1.12-3.1ubuntu0.17.04.1
  https://launchpad.net/ubuntu/+source/libplist/1.12-3.1ubuntu0.16.04.1
  https://launchpad.net/ubuntu/+source/libplist/1.10-1ubuntu0.1
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung