drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Eingabeprüfung in httpcomponents-client
Name: |
Mangelnde Eingabeprüfung in httpcomponents-client |
|
ID: |
DSA-4772-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian buster |
|
Datum: |
Mi, 14. Oktober 2020, 23:54 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13956 |
|
Applikationen: |
httpcomponents-client |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4772-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 14, 2020 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : httpcomponents-client CVE ID : CVE-2020-13956
Priyank Nigam discovered that HttpComponents Client, a Java HTTP agent implementation, could misinterpret malformed authority component in a request URI and pick the wrong target host for request execution.
For the stable distribution (buster), this problem has been fixed in version 4.5.7-1+deb10u1.
We recommend that you upgrade your httpcomponents-client packages.
For the detailed security status of httpcomponents-client please refer to its security tracker page at: https://security-tracker.debian.org/tracker/httpcomponents-client
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl+HXPcACgkQEMKTtsN8 TjbcAQ/9HBtUQKc4/JL0IaRLG5rOsZFU5WKLfliLjmMPHF7bfKgBze001EFMhh69 Tj4jXercJl/uCDkTpT8M5soAEioOI4hH536PtN9HUWj8kQFRYLAef3VKEOkndjcd sNYsRM36gvxgSE4381ink0dShbZ5xa5rpCVCMGOvxlbgrWJ7ilDe1zNReP+xJ9ZG 9KRlhiBtF2+j/EVtzmyCuYZ1I21DmOMAWZ3Z/sxAFFlfMTxB/PU3iq0XlPYLbkKj gXsLM8vCQCZKGWZ7oo4JocBNMaxpSb+j7mGyL/T3O1BbOeiupIspJlOnOfSCFpRG OoqSzrRW7FSSeEHHk5JgPYCfQK8h0w4LXSBFO3od+HIN4zVg/VTOCp4HeahSBbF7 sh9XX3HJYmFch5N4P9JpVil3dpPzVBDq7Wwa3QUH35E/pqsV0mjkhJVslOmmDpoO QyF+6RR9NJEo3OTiJ3cDuW/64x6eckUZY/1F+UMoOzN9yzzOrczt57p+sUzjXFlA /grLavSXmjC+vgbrWKjP2nQRZFWor5TsJ+BQPkQ/NmIUxxv4IRjJg6zXUwfE1wi2 RWQNvlkrjWYRpCXl+ZL1XsoIdIuamJq2PewAXgA2zJXxgNj+PV1Zy/uQSPaiVNei PrVkarrPgiGOUYXeZv1PYgteO2bVcFOnFQV511VOczJ2bwr5oS8= =hRen -----END PGP SIGNATURE-----
|
|
|
|