drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in OpenConnect
Name: |
Denial of Service in OpenConnect |
|
ID: |
USN-4565-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 18.04 LTS |
|
Datum: |
Di, 6. Oktober 2020, 22:35 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16239 |
|
Applikationen: |
OpenConnect |
|
Originalnachricht |
--===============6717955754653881850== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="ygdb7q2f3uzkn3xg" Content-Disposition: inline
--ygdb7q2f3uzkn3xg Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-4565-1 October 05, 2020
openconnect vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
Summary:
OpenConnect could be made to crash if it received specially crafted input.
Software Description: - openconnect: An SSL VPN client
Details:
It was discovered that OpenConnect has a buffer overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. An attacker could use it to provoke a denial of service (crash).
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS: libopenconnect5 7.08-3ubuntu0.18.04.2 openconnect 7.08-3ubuntu0.18.04.2
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4565-1 CVE-2019-16239
Package Information: https://launchpad.net/ubuntu/+source/openconnect/7.08-3ubuntu0.18.04.2
--ygdb7q2f3uzkn3xg Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEkCdEQ5T6DutSveCybUp5kL3izGYFAl98dHAACgkQbUp5kL3i zGaQrg//WPPzymxo9MdNqaWh/Nz83U5WJ6vI8l7/pCyuNbuopqHMOqKUvi1IgT+a kLnm3q7kU/13OtGrS6/rArAAzolYf3yjL47CdlspBRwux1TE1mtpyYkkpOYLZWnB MMpGdb8iQXnBNf94ZcVDMiodS427r1oK7mYVS1/bPQTpctO0lszXESqWZG3oQW/t XH8ITrW35rUilmEFajoupDjyW31PfRj+q4sARZDNl8D7uNK74H8FJoSo9QWSrj/8 nfmCoVPDW+hU9jKHvpYH2uEscEKacAPATzCFftvc/nv+I3HVFqxPUpS45XwKmH21 2TR0+V6aQcmBn2Kz7DiH4Z+OWokhz7xG766Jy0JCEXa+mOKpo9qi9QwT4C7Kr8Ji ulDb4wc+ZBkJt7JZ/w7B2e0qvB29UD/4sEuv9uJp3zF3T5p9+A02eZSBKdi0hY3y tVUTEUdnQyjQv8+DgXhXFWR3WX4pg++np4Y555SmJ4QLJEihqMTh8+LWltLGBrH/ RxQpUu5a5eWEBwBfNRkCIj0viwGSQhteRaxgEP2rrw4LFZ7GYzxDWWan8j7NSGRR rdgZvp5UVUh7s7vwMEBYv/MoBhwXGUA7+kDM8D+ehmiqFrePAhphWHm7m/5vHINe j8OQjZrjepFQ3sLY2yR7zSlkiA5GOZCOM2EJGzPOPU3/Mr41Ajo= =g+0P -----END PGP SIGNATURE-----
--ygdb7q2f3uzkn3xg--
--===============6717955754653881850== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
|
|
|
|