drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in screen
Name: |
Denial of Service in screen |
|
ID: |
USN-3996-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 ESM, Ubuntu 14.04 ESM |
|
Datum: |
Mi, 29. Mai 2019, 16:36 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6806 |
|
Applikationen: |
screen |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============6395444907440541958== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="3YfJ2eVcObVfxw32uP1BL70a8e5EjEEbn"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --3YfJ2eVcObVfxw32uP1BL70a8e5EjEEbn Content-Type: multipart/mixed; boundary="k3qCL9FT7H3fDHYVUJ2IPEJSWSWVshh9Y"; protected-headers="v1" From: Mike Salvatore <mike.salvatore@canonical.com> Reply-To: security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <39c45e66-a29d-c014-742c-d0cc2eaf0092@canonical.com> Subject: [USN-3996-1] GNU Screen vulnerability References: <20190529135537.542E426C27AB@lillypilly.canonical.com> In-Reply-To: <20190529135537.542E426C27AB@lillypilly.canonical.com>
--k3qCL9FT7H3fDHYVUJ2IPEJSWSWVshh9Y Content-Type: text/plain; charset=utf-8 Content-Language: en-U Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3996-1 May 29, 2019
GNU Screen vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM - Ubuntu 12.04 ESM
Summary:
GNU Screen could be made to crash or run programs as your login if it opened a specially crafted file or received specially crafted input.
Software Description: - screen: terminal multiplexer with VT100/ANSI terminal emulation
Details:
Kuang-che Wu discovered that GNU Screen improperly handled certain input. An attacker could use this issue to cause GNU Screen to crash, resulting in a denial of service or the execution of arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 ESM: screen 4.1.0~20120320gitdb59704-9ubuntu0.1~esm1
Ubuntu 12.04 ESM: screen 4.0.3-14ubuntu8.1
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/usn/usn-3996-1 CVE-2015-6806
--k3qCL9FT7H3fDHYVUJ2IPEJSWSWVshh9Y--
--3YfJ2eVcObVfxw32uP1BL70a8e5EjEEbn Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEwZbe96kJeWh2OITRdyg1Qz0oXX0FAlzulHoACgkQdyg1Qz0o XX0XNxAAq9uWBRd1IIbExAB+525BGM1vPyg+iiWCZcbafLZ7OCcBWaCxWkVDpFcM RIBA3MjSRiiOD4ifAZKI5bQ544Xw46e7iYGKttzuf4xz2703SvHHy79vorB4cKAb tvqSfe7W1Oj+rfSLNbf5LRaTTeYK3aZYXOi47imTObc2K8wdTW1NW+uaSB0hb8oT lddAJZFp4P3wGDZ2h0mYgyLACJaeKik6MJKNqIipJtpYeX3kVAs/E4aG4raL4HAx lKAo+4nXpYIieXD5lTlC3OhW88o0dFg2cRHOuTyPn0W547baUBFHr//OiOyy/FmR Wo4JXJkzvanZMCzJaDEUUHJnjCus664JPkqQ5zu599iQUAzFH54YyHgWt2DuCvjH 6wVPGe7B7KgEYrg6uxJfuLc92winqetfrJfrwdR4//QESYUo/wbjJtkxxF7eOBP9 9QZAhIHedqTPhWrg8pQAZPEEsy92318XOAsnk/vHsC4OR0ECELSz/1VgihiESTXX 3FJqCQynmD4ySf/potblfPc8KAtn7yVPNmqZiqxmEZHWBFgwUi+YGi1M1jglczr1 gPcX5aCMfgmvMnsrFmMc1K5qWae1ZBqwAmbTDVpA9OVI0F+q/kuRsvMWpz60p8vA FoZaWi3WC86cd9Nwi41TceL1wM7x3gdI7JWdmPfGEh2VMFEE/gE= =1WaK -----END PGP SIGNATURE-----
--3YfJ2eVcObVfxw32uP1BL70a8e5EjEEbn--
--===============6395444907440541958== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============6395444907440541958==--
|
|
|
|