exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Ubuntu Security Notice 890-5

Ubuntu Security Notice 890-5
Posted Feb 19, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 890-5 - USN-890-1 fixed vulnerabilities in Expat. This update provides the corresponding updates for XML-RPC for C and C++. Original advisory details: Jukka Taimisto, Tero Rontti and Rauli Kaksonen discovered that Expat did not properly process malformed XML. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service via application crash. It was discovered that Expat did not properly process malformed UTF-8 sequences. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service via application crash.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
advisories | CVE-2009-3560, CVE-2009-3720
SHA-256 | 52eb5cf05dd186c7c71a01ca7548fbcb53330023b7e0dfb24faca286a3ad70be

Ubuntu Security Notice 890-5

Change Mirror Download
===========================================================
Ubuntu Security Notice USN-890-5 February 18, 2010
xmlrpc-c vulnerabilities
CVE-2009-3560, CVE-2009-3720
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 9.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.10:
libxmlrpc-core-c3 1.06.27-1ubuntu6.1

After a standard system upgrade you need to restart any applications linked
against XML-RPC for C and C++ to effect the necessary changes.

Details follow:

USN-890-1 fixed vulnerabilities in Expat. This update provides the
corresponding updates for XML-RPC for C and C++.

Original advisory details:

Jukka Taimisto, Tero Rontti and Rauli Kaksonen discovered that Expat did
not properly process malformed XML. If a user or application linked against
Expat were tricked into opening a crafted XML file, an attacker could cause
a denial of service via application crash. (CVE-2009-2625, CVE-2009-3720)

It was discovered that Expat did not properly process malformed UTF-8
sequences. If a user or application linked against Expat were tricked into
opening a crafted XML file, an attacker could cause a denial of service via
application crash. (CVE-2009-3560)


Updated packages for Ubuntu 9.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/x/xmlrpc-c/xmlrpc-c_1.06.27-1ubuntu6.1.diff.gz
Size/MD5: 8970 3c900d470791bc6f96fef9f62ff855a6
http://security.ubuntu.com/ubuntu/pool/main/x/xmlrpc-c/xmlrpc-c_1.06.27-1ubuntu6.1.dsc
Size/MD5: 1235 ff5185e7e4f8dd3e28ca8ad37a71bc91
http://security.ubuntu.com/ubuntu/pool/main/x/xmlrpc-c/xmlrpc-c_1.06.27.orig.tar.gz
Size/MD5: 699510 bd58eae4f4ff3a5c469702dfeea55ec6

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/x/xmlrpc-c/libxmlrpc-c3-dev_1.06.27-1ubuntu6.1_amd64.deb
Size/MD5: 191574 c2a2705611c5b231cc3bb3437c156f98
http://security.ubuntu.com/ubuntu/pool/main/x/xmlrpc-c/libxmlrpc-c3_1.06.27-1ubuntu6.1_amd64.deb
Size/MD5: 138520 10302283794426be7ecb9f9da8826977
http://security.ubuntu.com/ubuntu/pool/main/x/xmlrpc-c/libxmlrpc-core-c3-dev_1.06.27-1ubuntu6.1_amd64.deb
Size/MD5: 150084 ae045bdb465eb913731eb9e5fd66f6a6
http://security.ubuntu.com/ubuntu/pool/main/x/xmlrpc-c/libxmlrpc-core-c3_1.06.27-1ubuntu6.1_amd64.deb
Size/MD5: 99832 b6fbfc2bf4410876efc9fe10d0d26be1
http://security.ubuntu.com/ubuntu/pool/universe/x/xmlrpc-c/xml-rpc-api2cpp_1.06.27-1ubuntu6.1_amd64.deb
Size/MD5: 33750 09898228a91d9b0b10f3c4aef67ec190
http://security.ubuntu.com/ubuntu/pool/universe/x/xmlrpc-c/xml-rpc-api2txt_1.06.27-1ubuntu6.1_amd64.deb
Size/MD5: 9380 b807c5c14b048de0e885211d8411e72e

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/x/xmlrpc-c/libxmlrpc-c3-dev_1.06.27-1ubuntu6.1_i386.deb
Size/MD5: 182138 7aa09d75854f07632eaa36fd9beb6843
http://security.ubuntu.com/ubuntu/pool/main/x/xmlrpc-c/libxmlrpc-c3_1.06.27-1ubuntu6.1_i386.deb
Size/MD5: 131416 56f607d37920de0f41c27b69334111e6
http://security.ubuntu.com/ubuntu/pool/main/x/xmlrpc-c/libxmlrpc-core-c3-dev_1.06.27-1ubuntu6.1_i386.deb
Size/MD5: 140394 5da6f9cd96c63509ca9784a7042eba65
http://security.ubuntu.com/ubuntu/pool/main/x/xmlrpc-c/libxmlrpc-core-c3_1.06.27-1ubuntu6.1_i386.deb
Size/MD5: 89646 cd2d07e62047f070662d10f060df0cfe
http://security.ubuntu.com/ubuntu/pool/universe/x/xmlrpc-c/xml-rpc-api2cpp_1.06.27-1ubuntu6.1_i386.deb
Size/MD5: 32702 6b1a84ec6820543c9dc7b953a5f123e5
http://security.ubuntu.com/ubuntu/pool/universe/x/xmlrpc-c/xml-rpc-api2txt_1.06.27-1ubuntu6.1_i386.deb
Size/MD5: 9384 4819490cbfacdd94a8cf0db7f4f17e79

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/x/xmlrpc-c/libxmlrpc-c3-dev_1.06.27-1ubuntu6.1_lpia.deb
Size/MD5: 180186 39862ee6fb6e16f4dd1003ef8b686028
http://ports.ubuntu.com/pool/main/x/xmlrpc-c/libxmlrpc-c3_1.06.27-1ubuntu6.1_lpia.deb
Size/MD5: 130832 56c7b4f046f1f8f873306080bf4cede2
http://ports.ubuntu.com/pool/main/x/xmlrpc-c/libxmlrpc-core-c3-dev_1.06.27-1ubuntu6.1_lpia.deb
Size/MD5: 138558 86254ef314197d91bf950920877dd57a
http://ports.ubuntu.com/pool/main/x/xmlrpc-c/libxmlrpc-core-c3_1.06.27-1ubuntu6.1_lpia.deb
Size/MD5: 88648 8cc8e2985938247771e282fb2ec74ed2
http://ports.ubuntu.com/pool/universe/x/xmlrpc-c/xml-rpc-api2cpp_1.06.27-1ubuntu6.1_lpia.deb
Size/MD5: 33176 83324c4b95b606fb340f0befff3d31e1
http://ports.ubuntu.com/pool/universe/x/xmlrpc-c/xml-rpc-api2txt_1.06.27-1ubuntu6.1_lpia.deb
Size/MD5: 9384 c7b935f896abac2f9bd56b5b28445310

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/x/xmlrpc-c/libxmlrpc-c3-dev_1.06.27-1ubuntu6.1_powerpc.deb
Size/MD5: 187912 486758dc40e04cf06ad1fdce6ae16e6d
http://ports.ubuntu.com/pool/main/x/xmlrpc-c/libxmlrpc-c3_1.06.27-1ubuntu6.1_powerpc.deb
Size/MD5: 137040 67220384287d2e5b2794a17262445556
http://ports.ubuntu.com/pool/main/x/xmlrpc-c/libxmlrpc-core-c3-dev_1.06.27-1ubuntu6.1_powerpc.deb
Size/MD5: 156454 675c23ccc310f179ec1f7997645aac1f
http://ports.ubuntu.com/pool/main/x/xmlrpc-c/libxmlrpc-core-c3_1.06.27-1ubuntu6.1_powerpc.deb
Size/MD5: 94152 d2f177d93c783799c63991b64d6ceeb0
http://ports.ubuntu.com/pool/universe/x/xmlrpc-c/xml-rpc-api2cpp_1.06.27-1ubuntu6.1_powerpc.deb
Size/MD5: 33250 98efefe38967441c5c15d3d06e1f4051
http://ports.ubuntu.com/pool/universe/x/xmlrpc-c/xml-rpc-api2txt_1.06.27-1ubuntu6.1_powerpc.deb
Size/MD5: 9386 5b79da5cbaf25ed20b9f11a9c06697e5

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/x/xmlrpc-c/libxmlrpc-c3-dev_1.06.27-1ubuntu6.1_sparc.deb
Size/MD5: 183118 3b3bef9a36389a1ba4f92ecd11c95977
http://ports.ubuntu.com/pool/main/x/xmlrpc-c/libxmlrpc-c3_1.06.27-1ubuntu6.1_sparc.deb
Size/MD5: 125894 26ea9b2e3c93e1969a4b57a2237d5f6b
http://ports.ubuntu.com/pool/main/x/xmlrpc-c/libxmlrpc-core-c3-dev_1.06.27-1ubuntu6.1_sparc.deb
Size/MD5: 119290 4a15dcbdb3429aed9263f3940f04fcd2
http://ports.ubuntu.com/pool/main/x/xmlrpc-c/libxmlrpc-core-c3_1.06.27-1ubuntu6.1_sparc.deb
Size/MD5: 83000 2caba2114e0745fffa7bd71c52373cc5
http://ports.ubuntu.com/pool/universe/x/xmlrpc-c/xml-rpc-api2cpp_1.06.27-1ubuntu6.1_sparc.deb
Size/MD5: 33024 952e863564659fc1c9e73be847ff5756
http://ports.ubuntu.com/pool/universe/x/xmlrpc-c/xml-rpc-api2txt_1.06.27-1ubuntu6.1_sparc.deb
Size/MD5: 9384 ea9363a086d7bcbf10b7ab15e6c8adeb



Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close