Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in tcpflow
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in tcpflow
ID: USN-3955-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 18.10
Datum: Do, 25. April 2019, 17:09
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18409
Applikationen: tcpflow

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============3761356067559791957==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="RN6J62H0923SABaFAwreMMgb71OfajM4a"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--RN6J62H0923SABaFAwreMMgb71OfajM4a
Content-Type: multipart/mixed;
boundary="mhf6BJEhGtFfHK3Q6TArmFOUUNPttuW7D";
protected-headers="v1"
From: Mike Salvatore <mike.salvatore@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <31733e1c-2cfd-1d0f-18e3-f1070a56cdf0@canonical.com>
Subject: [USN-3955-1] tcpflow vulnerabilities
References: <20190424175758.CC90526C298D@lillypilly.canonical.com>
In-Reply-To: <20190424175758.CC90526C298D@lillypilly.canonical.com>

--mhf6BJEhGtFfHK3Q6TArmFOUUNPttuW7D
Content-Type: text/plain; charset=utf-8
Content-Language: en-U
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3955-1
April 24, 2019

tcpflow vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

tcpflow could be made to crash or expose sensitive information over the network
if it opened a specially crafted file or received specially crafted network
traffic.

Software Description:
- tcpflow: TCP flow recorder

Details:

It was discovered that tcpflow incorrectly handled certain malformed network
packets. A remote attacker could send these packets to a target system, causing
tcpflow to crash or possibly disclose sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
tcpflow 1.4.5+repack1-4ubuntu0.18.10.1
tcpflow-nox 1.4.5+repack1-4ubuntu0.18.10.1

Ubuntu 18.04 LTS:
tcpflow 1.4.5+repack1-4ubuntu0.18.04.1
tcpflow-nox 1.4.5+repack1-4ubuntu0.18.04.1

Ubuntu 16.04 LTS:
tcpflow 1.4.5+repack1-1ubuntu0.1
tcpflow-nox 1.4.5+repack1-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3955-1
CVE-2018-14938, CVE-2018-18409

Package Information:
https://launchpad.net/ubuntu/+source/tcpflow/1.4.5+repack1-4ubuntu0.18.10.1
https://launchpad.net/ubuntu/+source/tcpflow/1.4.5+repack1-4ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/tcpflow/1.4.5+repack1-1ubuntu0.1


--mhf6BJEhGtFfHK3Q6TArmFOUUNPttuW7D--

--RN6J62H0923SABaFAwreMMgb71OfajM4a
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=RmC5
-----END PGP SIGNATURE-----

--RN6J62H0923SABaFAwreMMgb71OfajM4a--


--===============3761356067559791957==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============3761356067559791957==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung