drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Eingabeprüfung in GUPnP
Name: |
Mangelnde Eingabeprüfung in GUPnP |
|
ID: |
USN-4494-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 20.04 LTS |
|
Datum: |
Di, 15. September 2020, 22:53 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12695 |
|
Applikationen: |
GUPnP |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============9128895571651604552== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="D5yVMZG5NZcFIvoRuAO9aOQyPw2dBUqvm"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --D5yVMZG5NZcFIvoRuAO9aOQyPw2dBUqvm Content-Type: multipart/mixed; boundary="dvl56ySqOrkquYmtGHyLPSmC3aTz3y23U"
--dvl56ySqOrkquYmtGHyLPSmC3aTz3y23U Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4494-1 September 15, 2020
gupnp vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
gupnp could be made to expose sensitive information or perform network attacks if it received specially crafted network traffic.
Software Description: - gupnp: framework for creating UPnP devices and control points
Details:
It was discovered that GUPnP incorrectly handled certain subscription requests. A remote attacker could possibly use this issue to exfiltrate data or use GUPnP to perform DDoS attacks.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS: libgupnp-1.2-0 1.2.3-0ubuntu0.20.04.1
After a standard system update you need to reboot your computer to make all the necessary changes.
References: https://usn.ubuntu.com/4494-1 CVE-2020-12695
Package Information: https://launchpad.net/ubuntu/+source/gupnp/1.2.3-0ubuntu0.20.04.1
--dvl56ySqOrkquYmtGHyLPSmC3aTz3y23U--
--D5yVMZG5NZcFIvoRuAO9aOQyPw2dBUqvm Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAl9grBcACgkQZWnYVadE vpOvrxAAsWA0FLZ6InJCYmwkMcSThJiQTHwh0DMuKodGu/4oJU83v3518docH1yr n7cAA7lkNaqdOHyGFF5FFkqeZ2erpmGmMAL5iciHIvrhT5F1aEK3XEnu/Fyy1evE VTLI1vL2TAVDk6yiXq4qwkjC+UTRB1uqJjBxXmaPZQ1Nv3BmbykK+6m/v55tnXKJ FDDPNhHSoe503HyMvksuRFcqnAAObjXIq0uEhtxct+i16kjP45qEG4TBueKaRqfw DBswtJIfc7foVRuat+1r8nA/Vt5qmLzZ3yaCM+HxhusRpt6rxdDL0QuNvfdX+4kn dZnYyY4ovRECy7zoC3Ga5SfgHfV5JVJDQcpHPOfVMDG8ssmAM6uc4LiUg8qtvOz6 eBr9/Xd/gJNqOp5Zx/gqDeTOqcaML5jTRG25LQKwYdIYU9MF9qORAGX/EvFMWKGw kuIjycXjgJaRD5s6qm8ApWfTYijYpuMh+7sYbl3Q31Wi/BaLSTjhevO6k6tlOsVQ 6ouMuKJss888dPbD7C4MayXw7eB1iKOKptwC93IcdD8chjHE0n0wpJ9PtprAogvq SAceGYnBjE7qfFFjEf52/kKx7EbNkAfAyj/qEvVXbz9PZPmHW9892NuWtOpB3wZe Ru9rq7vPAgyZqyWOQyZNfvoEsWla0s1KTN8u4O6l91R6uxmGBVs= =ryXX -----END PGP SIGNATURE-----
--D5yVMZG5NZcFIvoRuAO9aOQyPw2dBUqvm--
--===============9128895571651604552== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============9128895571651604552==--
|
|
|
|