Mehrere Probleme in curl (Aktualisierung)
ID: | USN-3598-2 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 ESM |
Datum: | Do, 24. Mai 2018, 20:26 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301 |
Applikationen: | curl |
Update von: | Mehrere Probleme in curl |
Originalnachricht |
|
--===============4385702735651793032== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-z9OpbsUY8PuNJNnsFcoe" --=-z9OpbsUY8PuNJNnsFcoe Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-3598-2 May 24, 2018 curl vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: Several security issues were fixed in curl. Software Description: - curl: HTTP, HTTPS, and FTP client and client libraries Details: USN-3598-1 fixed a vulnerability in curl. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: Phan Thanh discovered that curl incorrectly handled certain FTP paths. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2018-1000120) Dario Weisser discovered that curl incorrectly handled certain LDAP URLs. An attacker could possibly use this issue to cause a denial of service. (CVE-2018-1000121) Max Dymond discovered that curl incorrectly handled certain RTSP data. An attacker could possibly use this to cause a denial of service or even to get access to sensitive data. (CVE-2018-1000122) Max Dymond discovered that curl incorrectly handled certain RTSP responses. If a user or automated system were tricked into connecting to a malicious server, a remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly obtain sensitive information. (CVE-2018-1000301) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: curl 7.22.0-3ubuntu4.21 libcurl3 7.22.0-3ubuntu4.21 libcurl3-gnutls 7.22.0-3ubuntu4.21 libcurl3-nss 7.22.0-3ubuntu4.21 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/usn/usn-3598-2 https://usn.ubuntu.com/usn/usn-3598-1 CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000301 --=-z9OpbsUY8PuNJNnsFcoe Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAABCAAGBQJbBvVVAAoJEEW851uECx9pNMcQAKmFwVlLaL2VaelYivr5b7Ym 4bqi92r9BRNIzKTPw30ENkY2Ib9NOvGcNy+Pl5LsSCP3fGhBPnpXfkb0HWegdFVB h8CrZD6CBvwhtfgNCRUKGnA37vjV5I+RznJ02x4d9rX9FAf2+MSHOes+ClDHwdpx 4VvN3IxBBNxHHecUoOPAK5JpwhhtjsJf8qUUGY7wegWqRkOrfHv5E4crwTxDfHX0 h1Gok7lXyBoVPk/c/eFABJH60TrYFPWh0GrP3gjSBqccZaviO/T6vewncNh28em4 6jqP674Lg1R4hYJqH5/APRO9kH81zMb118B0XZ5PiEXTR7MR63nM6WUo2ezPEw0I yrPdOlSWTPJckNt0XG0Ynt7C4cgue7DAgr2/OpLKaKnNK0Td3kNf4zqb2FvSxUUV SDwt9v14a0wQhuBdfOGpjwragOdUd9Uqyy4ut0WUnSxyc8s/bxFghcc19zHmMmt0 rAnpI6w4V0TsnnRGu99dsl0++SAI3QcerOe+i2dcFjoIbluY9/7r34RxDMkD3eTh NI+rGpwxyIoR7jcDh2MMdBA7W3FqedYAKr8hauotsToNSt06e/sP8ee6V68mDc58 RVzWIsp31dj4Y88bTgrUpeCg6qWz74sCfH2QWYdBOtP27gvzm4uEs+wyBK0M5g1V fnVUF9wfMvQjfHo3NWlf =Vzeh -----END PGP SIGNATURE----- --=-z9OpbsUY8PuNJNnsFcoe-- --===============4385702735651793032== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK --===============4385702735651793032==-- |