You are here
Home > Preporuke > Sigurnosni nedostatak programske biblioteke libplist

Sigurnosni nedostatak programske biblioteke libplist

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3429-1
September 25, 2017

libplist vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 17.04
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Libplist could be made to crash if it opened a specially crafted
file.

Software Description:
– libplist: Library for handling Apple binary and XML property lists

Details:

Wang Junjie discovered that Libplist incorrectly handled certain files.
If a user were tricked into opening a crafted file, an attacker could
possibly use this to cause a crash or denial or service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
  libplist-utils                  1.12-3.1ubuntu0.17.04.1
  libplist3                       1.12-3.1ubuntu0.17.04.1
  python-plist                    1.12-3.1ubuntu0.17.04.1

Ubuntu 16.04 LTS:
  libplist-utils                  1.12-3.1ubuntu0.16.04.1
  libplist3                       1.12-3.1ubuntu0.16.04.1
  python-plist                    1.12-3.1ubuntu0.16.04.1

Ubuntu 14.04 LTS:
  libplist-utils                  1.10-1ubuntu0.1
  libplist1                       1.10-1ubuntu0.1
  python-plist                    1.10-1ubuntu0.1

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3429-1
  CVE-2017-7982

Package Information:
  https://launchpad.net/ubuntu/+source/libplist/1.12-3.1ubuntu0.17.04.1
  https://launchpad.net/ubuntu/+source/libplist/1.12-3.1ubuntu0.16.04.1
  https://launchpad.net/ubuntu/+source/libplist/1.10-1ubuntu0.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=87SX
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-09-0065-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa chromium-browser

Otkriveni su sigurnosni nedostaci u programskom paketu chromium-browser za RHEL 6. Otkriveni nedostaci potencijalnim napadačima omogućuju rušenje servisa, izvršavanje proizvoljnog...

Close