Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in OpenSLP
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in OpenSLP
ID: USN-2730-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.04
Datum: Do, 3. September 2015, 19:23
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5177
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4428
Applikationen: OpenSLP

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============7495176448282216170==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="FNXc2na1pMNWfEU2pvbiffoGwcb4pWJe9"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--FNXc2na1pMNWfEU2pvbiffoGwcb4pWJe9
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2730-1
September 03, 2015

openslp-dfsg vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

OpenSLP could be made to crash if it received specially crafted network
traffic.

Software Description:
- openslp-dfsg: OpenSLP development files

Details:

Georgi Geshev discovered that OpenSLP incorrectly handled processing
certain service requests. A remote attacker could possibly use this issue
to cause OpenSLP to crash, resulting in a denial of service. This issue
only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2012-4428)

Qinghao Tang discovered that OpenSLP incorrectly handled processing certain
messages. A remote attacker could possibly use this issue to cause
OpenSLP to crash, resulting in a denial of service. (CVE-2015-5177)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
libslp1 1.2.1-10ubuntu0.1

Ubuntu 14.04 LTS:
libslp1 1.2.1-9ubuntu0.2

Ubuntu 12.04 LTS:
libslp1 1.2.1-7.8ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2730-1
CVE-2012-4428, CVE-2015-5177

Package Information:
https://launchpad.net/ubuntu/+source/openslp-dfsg/1.2.1-10ubuntu0.1
https://launchpad.net/ubuntu/+source/openslp-dfsg/1.2.1-9ubuntu0.2
https://launchpad.net/ubuntu/+source/openslp-dfsg/1.2.1-7.8ubuntu1.1



--FNXc2na1pMNWfEU2pvbiffoGwcb4pWJe9
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=1RrE
-----END PGP SIGNATURE-----

--FNXc2na1pMNWfEU2pvbiffoGwcb4pWJe9--


--===============7495176448282216170==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============7495176448282216170==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung