Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in International Components for Unicode (C/C++) (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in International Components for Unicode (C/C++) (Aktualisierung)
ID: USN-3458-2
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 ESM
Datum: Mo, 23. Oktober 2017, 23:15
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14952
Applikationen: International Components for Unicode (C/C++)
Update von: Ausführen beliebiger Kommandos in International Components for Unicode (C/C++)

Originalnachricht


--===============3674924232765429609==
Content-Type: multipart/signed; micalg="pgp-sha256";
protocol="application/pgp-signature";
boundary="=-NS9tCPJruYMsdNUV62ts"


--=-NS9tCPJruYMsdNUV62ts
Content-Type: text/plain; charset="UTF-8
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3458-2
October 23, 2017

icu vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

ICU could be made to crash or run arbitrary code as your login
if it received specially crafted input.

Software Description:
- icu: International Components for Unicode library

Details:

USN-3458-1 fixed a vulnerability in ICU. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

 It was discovered that ICU incorrectly handled certain inputs. If an
 application using ICU processed crafted data, a remote attacker could
 possibly cause it to crash or potentially execute arbitrary code with
 the privileges of the user invoking the program.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  lib32icu48                      4.8.1.1-3ubuntu0.9
  libicu48                        4.8.1.1-3ubuntu0.9

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3458-2
  https://www.ubuntu.com/usn/usn-3458-1
  CVE-2017-14952

--×S9tCPJruYMsdNUV62ts
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=VRKo
-----END PGP SIGNATURE-----

--=-NS9tCPJruYMsdNUV62ts--



--===============3674924232765429609==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============3674924232765429609==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung