You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa miniupnpc

Sigurnosni nedostatak programskog paketa miniupnpc

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3298-1
May 24, 2017

miniupnpc vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

MiniUPnP could be made to crash or run programs if it received specially
crafted network traffic.

Software Description:
– miniupnpc: UPnP IGD client lightweight library

Details:

It was discovered that MiniUPnP incorrectly handled memory. A remote
attacker could use this issue to cause a denial of service or possibly
execute arbitrary code with privileges of the user running an application
that uses the MiniUPnP library.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
libminiupnpc10 1.9.20140610-2ubuntu2.16.10.1

Ubuntu 16.04 LTS:
libminiupnpc10 1.9.20140610-2ubuntu2.16.04.1

Ubuntu 14.04 LTS:
libminiupnpc8 1.6-3ubuntu2.14.04.3

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3298-1
CVE-2017-8798

Package Information:
https://launchpad.net/ubuntu/+source/miniupnpc/1.9.20140610-2ubuntu2.16.10.1
https://launchpad.net/ubuntu/+source/miniupnpc/1.9.20140610-2ubuntu2.16.04.1
https://launchpad.net/ubuntu/+source/miniupnpc/1.6-3ubuntu2.14.04.3

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=WkkG
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-3298-2
May 24, 2017

miniupnpc vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 17.04

Summary:

MiniUPnP could be made to crash or run programs if it received specially
crafted network traffic.

Software Description:
– miniupnpc: UPnP IGD client lightweight library

Details:

USN-3298-1 fixed a vulnerability in MiniUPnP. This update provides the
corresponding update for Ubuntu 17.04.

Original advisory details:

It was discovered that MiniUPnP incorrectly handled memory. A remote
attacker could use this issue to cause a denial of service or possibly
execute arbitrary code with privileges of the user running an application
that uses the MiniUPnP library.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
libminiupnpc10 1.9.20140610-2ubuntu2.17.04.1

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3298-2
https://www.ubuntu.com/usn/usn-3298-1
CVE-2017-8798

Package Information:
https://launchpad.net/ubuntu/+source/miniupnpc/1.9.20140610-2ubuntu2.17.04.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=bIbY
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-05-0085-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa samba

Otkriven je sigurnosni nedostatak u programskom paketu samba za operacijski sustav SUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje izvršavanje proizvoljnog programskog...

Close