Your submission was sent successfully! Close

USN-3059-1: xmlrpc-epi vulnerability

10 August 2016

xmlrpc-epi could be made to crash or run programs if it processed specially crafted data.




It was discovered that xmlrpc-epi incorrectly handled lengths in the
simplestring_addn function. A remote attacker could use this issue to cause
applications using xmlrpc-epi such as PHP to crash, resulting in a denial
of service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04

In general, a standard system update will make all the necessary changes.


Related notices

  • USN-3045-1: php5-curl, php5-dev, php7.0, php7.0-odbc, php7.0-mcrypt, php7.0-bz2, php7.0-dba, php7.0-enchant, php7.0-soap, php5-mysql, php5, php5-cli, php5-ldap, php5-sqlite, php7.0-interbase, php7.0-xsl, php7.0-zip, php5-mysqlnd, php7.0-cgi, php7.0-ldap, php7.0-fpm, php7.0-sqlite3, php-pear, php7.0-common, php7.0-tidy, php7.0-phpdbg, php7.0-cli, php7.0-readline, php5-pgsql, php7.0-pgsql, libapache2-mod-php5, php7.0-intl, php5-xmlrpc, php5-snmp, php5-xsl, php7.0-imap, php7.0-json, php7.0-mysql, php7.0-recode, libapache2-mod-php5filter, php7.0-pspell, php5-gmp, php5-enchant, php5-intl, php5-recode, php5-sybase, libapache2-mod-php7.0, php7.0-gd, php5-gd, libphp7.0-embed, php7.0-dev, php5-fpm, php5-readline, php7.0-bcmath, php7.0-gmp, libphp5-embed, php7.0-sybase, php7.0-xml, php5-common, php5-cgi, php5-pspell, php7.0-curl, php7.0-mbstring, php7.0-snmp, php7.0-opcache, php7.0-xmlrpc, php5-odbc, php5-tidy