drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in International Components for Unicode (C/C++) (Aktualisierung)
Name: |
Ausführen beliebiger Kommandos in International Components for Unicode (C/C++) (Aktualisierung) |
|
ID: |
USN-3458-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 ESM |
|
Datum: |
Mo, 23. Oktober 2017, 23:15 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14952 |
|
Applikationen: |
International Components for Unicode (C/C++) |
|
Update von: |
Ausführen beliebiger Kommandos in International Components for Unicode (C/C++) |
|
Originalnachricht |
--===============3674924232765429609== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-NS9tCPJruYMsdNUV62ts"
--=-NS9tCPJruYMsdNUV62ts Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3458-2 October 23, 2017
icu vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
ICU could be made to crash or run arbitrary code as your login if it received specially crafted input.
Software Description: - icu: International Components for Unicode library
Details:
USN-3458-1 fixed a vulnerability in ICU. This update provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
 It was discovered that ICU incorrectly handled certain inputs. If an  application using ICU processed crafted data, a remote attacker could  possibly cause it to crash or potentially execute arbitrary code with  the privileges of the user invoking the program.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 ESM: Â lib32icu48Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 4.8.1.1-3ubuntu0.9 Â libicu48Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 4.8.1.1-3ubuntu0.9
In general, a standard system update will make all the necessary changes.
References: Â https://www.ubuntu.com/usn/usn-3458-2 Â https://www.ubuntu.com/usn/usn-3458-1 Â CVE-2017-14952
--×S9tCPJruYMsdNUV62ts Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAABCAAGBQJZ7ju8AAoJEEW851uECx9pwsoP/1LMXP2hdF2W2kwKuDwtTGqs LXB+t/2kToOsrzfl8YZHP5U1LUHvks6FEnOHbxAPZlYPkgWMOV7MOIjnytaTB+Qh IWGjRma0DowHgSC5Oe/tL4bAgwsgVnvSi5i1mv5P8jL5hLGPPAawj4U/hQ8nDvbv tqRfXIy2rJPJ178aBAFSlccU8G66bOxzy5z3mPy1EZ0Ipgo4lgumdzLA/XNoyWgQ YN0VuZzed4GGycTKYfpYS1Oe44Vd1aq3iDfAJuXzNdwTzNwQQwcCFdmlzuM9RbE4 2Cfy3AW+rU5f/YhUwDyrOJOCv7F5AWgGU1p7wr5pztCfyQeplyL87oQnV/HRAfoD ZpBH7oUjSzab6k7kprDmDHkUVri/tNvHtrV+r5NkskvWNKTPj4dXbkYpXk29xQxp 8PFhuKSsRoYjhL01WiNuZS1PnTnn324yKHdot1cSDeJPA/IkZRjE6bVpTLTOL4lc 7XSbrumEYDlVPS5NxhJAeKgBYrXUhVUuA8hWw04fBj6fJqSy0kmyEhFjLRo1lPif UbtTuUbjpDgS0LnjaslMlKTxxt3O4+vo997bycUfIugeD28g9Z5LHHIK+JoIFS8a 9SqM1h+VxxPTZSMzoEbY6Bp9wVVmX7sNjFdu6qrURWJKu8z8j4aunCn83GvbDldH 8uu5qU3+TLDnmZsF/Ggp =VRKo -----END PGP SIGNATURE-----
--=-NS9tCPJruYMsdNUV62ts--
--===============3674924232765429609== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============3674924232765429609==--
|
|
|
|