Login
Newsletter
Werbung

Sicherheit: Denial of Service in OpenConnect
Aktuelle Meldungen Distributionen
Name: Denial of Service in OpenConnect
ID: USN-4565-1
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS
Datum: Di, 6. Oktober 2020, 22:35
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16239
Applikationen: OpenConnect

Originalnachricht


--===============6717955754653881850==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="ygdb7q2f3uzkn3xg"
Content-Disposition: inline


--ygdb7q2f3uzkn3xg
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-4565-1
October 05, 2020

openconnect vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

OpenConnect could be made to crash if it received specially crafted
input.

Software Description:
- openconnect: An SSL VPN client

Details:

It was discovered that OpenConnect has a buffer overflow when a malicious
server uses HTTP chunked encoding with crafted chunk sizes. An attacker
could use it to provoke a denial of service (crash).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
libopenconnect5 7.08-3ubuntu0.18.04.2
openconnect 7.08-3ubuntu0.18.04.2

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4565-1
CVE-2019-16239

Package Information:
https://launchpad.net/ubuntu/+source/openconnect/7.08-3ubuntu0.18.04.2

--ygdb7q2f3uzkn3xg
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=g+0P
-----END PGP SIGNATURE-----

--ygdb7q2f3uzkn3xg--


--===============6717955754653881850==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung