drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in libgadu
Name: |
Ausführen beliebiger Kommandos in libgadu |
|
ID: |
USN-2101-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.10 |
|
Datum: |
Di, 11. Februar 2014, 00:08 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487 |
|
Applikationen: |
libgadu |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0493802331962840178== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="5DrdbcAxIUGaAWxfs455D5cFAlanabfi6"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --5DrdbcAxIUGaAWxfs455D5cFAlanabfi6 Content-Type: text/plain; charset=UTF- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2101-1 February 10, 2014
libgadu vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.10 - Ubuntu 12.10 - Ubuntu 12.04 LTS
Summary:
libgadu could be made to crash or run programs if it received specially crafted network traffic.
Software Description: - libgadu: Gadu-Gadu protocol library
Details:
Yves Younan and Ryan Pentney discovered that libgadu incorrectly handled certain Gadu-Gadu HTTP messages. A malicious remote server or a man in the middle could use this issue to cause applications using libgadu to crash, resulting in a denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 13.10: libgadu3 1:1.11.2-1ubuntu1.1
Ubuntu 12.10: libgadu3 1:1.11.2-1ubuntu0.12.10.1
Ubuntu 12.04 LTS: libgadu3 1:1.11.1-1ubuntu0.1
After a standard system update you need to restart your session to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2101-1 CVE-2013-6487
Package Information: https://launchpad.net/ubuntu/+source/libgadu/1:1.11.2-1ubuntu1.1 https://launchpad.net/ubuntu/+source/libgadu/1:1.11.2-1ubuntu0.12.10.1 https://launchpad.net/ubuntu/+source/libgadu/1:1.11.1-1ubuntu0.1
--5DrdbcAxIUGaAWxfs455D5cFAlanabfi6 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQIcBAEBCgAGBQJS+RatAAoJEGVp2FWnRL6TU18QAJOc26BbTiRpO96M53YKHwdi 4ZrI/vrSMVT2IQUMjDTcuqisJHSrU7MUIrDam4CyYWl0lsT0X3XH15JafMy4Qelb Hc6EnIyxhKp9Vq6dt/w0m1x3RLx9dmOzKq5neN8n3T4BQmayHFXI3gEl7849/Mv3 taRwKZlQpldr05UohopHlJS6XW4FNlYqPyeSloGP5YFzyi5sr3cPcC8N/Xgr2OKj 7xPD2aSHCQh5ifuDTOtzG0jibxTDeAJUm3CToYDKi+XZigcihxGDJH0LDfq04ooT 2Qnx7rlAU6eBqAC9Kx/sYELCFanJ4ur2+OiNKFXhu+nID5vob01XwLxpMi51cDrS bNaTZ29Wj+aVvpKVXxLkrTRzwFM4QpBhNETl1uT5YYI0cibkk8k9YRHCQzfcOEma pYwznrUPCcsbs9KiD0nKCSKgapFJB9cRjbH7+sr3Igoev4qXDbwrbllHQ9INIuPB RMr0qdA7rEw1fpBQfHu1bOltjkwvuram80hyJjiSZk9aC5/oq7zx+0PD62LGtbkZ +sFq94IFV8b7rmaWxWbOA+snLoP+UML2XEWfg5sBobp0ll3ccmDu3KpK9lSYp7LB oSAviw0uqTEsBsGj7IoFdtOR3JvuJFM0vqocC+Oxzwb78VoZ42vO22lJ1z7BQ0nC dvw3XffuiZVFLZ1pHO5z =qqy5 -----END PGP SIGNATURE-----
--5DrdbcAxIUGaAWxfs455D5cFAlanabfi6--
--===============0493802331962840178== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0493802331962840178==--
|
|
|
|