You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa tcpflow

Sigurnosni nedostaci programskog paketa tcpflow

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3955-1
April 24, 2019

tcpflow vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

tcpflow could be made to crash or expose sensitive information over the network
if it opened a specially crafted file or received specially crafted network
traffic.

Software Description:
– tcpflow: TCP flow recorder

Details:

It was discovered that tcpflow incorrectly handled certain malformed network
packets. A remote attacker could send these packets to a target system, causing
tcpflow to crash or possibly disclose sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
tcpflow 1.4.5+repack1-4ubuntu0.18.10.1
tcpflow-nox 1.4.5+repack1-4ubuntu0.18.10.1

Ubuntu 18.04 LTS:
tcpflow 1.4.5+repack1-4ubuntu0.18.04.1
tcpflow-nox 1.4.5+repack1-4ubuntu0.18.04.1

Ubuntu 16.04 LTS:
tcpflow 1.4.5+repack1-1ubuntu0.1
tcpflow-nox 1.4.5+repack1-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3955-1
CVE-2018-14938, CVE-2018-18409

Package Information:
https://launchpad.net/ubuntu/+source/tcpflow/1.4.5+repack1-4ubuntu0.18.10.1
https://launchpad.net/ubuntu/+source/tcpflow/1.4.5+repack1-4ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/tcpflow/1.4.5+repack1-1ubuntu0.1

—–BEGIN PGP SIGNATURE—–
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=RmC5
—–END PGP SIGNATURE—–

AutorJosip Papratovic
Cert idNCERT-REF-2019-04-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa openexr

Otkriven je sigurnosni nedostatak u programskom paketu openexr za operacijski sustav openSUSE. Otkriveni nedostatak potencijalnim udaljenim napadačima omogućuje izazivanje DoS...

Close