drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in OpenLDAP (Aktualisierung)
Name: |
Ausführen beliebiger Kommandos in OpenLDAP (Aktualisierung) |
|
ID: |
USN-4622-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 ESM, Ubuntu 14.04 ESM |
|
Datum: |
Do, 12. November 2020, 00:06 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692 |
|
Applikationen: |
OpenLDAP |
|
Update von: |
Ausführen beliebiger Kommandos in OpenLDAP |
|
Originalnachricht |
--===============5221846676999307870== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="dc+cDN39EJAMEtIO" Content-Disposition: inline
--dc+cDN39EJAMEtIO Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-4622-2 November 11, 2020
openldap vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM - Ubuntu 12.04 ESM
Summary:
OpenLDAP could be made to crash or run programs if it received specially crafted network traffic.
Software Description: - openldap: Lightweight Directory Access Protocol
Details:
USN-4622-1 fixed a vulnerability in OpenLDAP. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that OpenLDAP incorrectly handled certain network packets. A remote attacker could use this issue to cause OpenLDAP to crash, resulting in a denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 ESM: slapd 2.4.31-1+nmu2ubuntu8.5+esm3
Ubuntu 12.04 ESM: slapd 2.4.28-1.1ubuntu4.11
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4622-2 https://usn.ubuntu.com/4622-1 CVE-2020-25692
--dc+cDN39EJAMEtIO Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEEf+ebRFcoyOoAQoOeRbznW4QLH2kFAl+sMwkACgkQRbznW4QL H2lrXw//WweSNl/J5nflD1TynpxLcfHO85Iy3DF8vsT7IE5ykkFo4T2uM1XE2jkf /o0cWqXNJii1br0zzVgiPqJeRQ72xxFz6UHXoJhkZCdMHcx22lXE3FCdGImCmtIJ H5wrkyyCJkZxoywpsxuI61Anz6vxP/le1lRONFsUgiQ165h6QvOO/7JyzzTWNJfG q4lW0ufFwme3d7jxBEHPoBqZHPXyuaXuCrPsugkvN1QI0Vt0HdrrEVoNtVUKKFuc WHmgAgYmIphZ7PbycYGoLhyHtlVaVZOQRjDT/37957VmMtQnGI49XIGvt77cseIt sI6SDKbG4N85PpePg/v2q0fRYMuFDMcS8VXjeJvlJ0/HxS7GNb14/tpVZMNVlmwG irzKYjd7a9UBbJkEgAI6cP/MPx/fNOY6e6avO+YtctvY2Muhoa/vBSUJSBh99qxm qcOqCqGVbHfJcH5ZKBbgaJcJ2xnVWVt0hCk41vWJeT6E3X43XHAee8wlafWfyMzR 7EosHFuUg2s8TT0a7HBYiYHsjFTeIR1CiE0MTEyCPxAgXhxAse/SdzxsHpUl09wr jzBtHb1W3FUAOWDu2YBpPxEdIuCcWEKzAxRX0nafzTqnM9n7Yy5VZmADME2ai9xa adyKvUyke4Kw65+D0MvUyS9viRfg1NQJTAxTYsfQx5reS2dyBMo= =K8BI -----END PGP SIGNATURE-----
--dc+cDN39EJAMEtIO--
--===============5221846676999307870== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
|
|
|
|