USN-3059-1: xmlrpc-epi vulnerability
10 August 2016
xmlrpc-epi could be made to crash or run programs if it processed specially crafted data.
Releases
Packages
- xmlrpc-epi - a XML-RPC request library
Details
It was discovered that xmlrpc-epi incorrectly handled lengths in the
simplestring_addn function. A remote attacker could use this issue to cause
applications using xmlrpc-epi such as PHP to crash, resulting in a denial
of service, or possibly execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3045-1: php7.0-opcache, php7.0, php7.0-common, php7.0-mbstring, php7.0-tidy, php7.0-pgsql, php5-xmlrpc, php5-sybase, php5-tidy, php5-pgsql, php5-recode, php5-odbc, php7.0-mysql, php7.0-cli, php7.0-enchant, php7.0-zip, php7.0-cgi, php5, php7.0-xmlrpc, php7.0-dba, php5-enchant, php5-snmp, php5-curl, php5-ldap, php7.0-json, php7.0-odbc, php7.0-pspell, php7.0-ldap, php5-mysqlnd, php7.0-bcmath, php5-intl, php7.0-gd, php7.0-gmp, php7.0-intl, php7.0-fpm, php7.0-interbase, php7.0-mcrypt, php5-readline, php5-pspell, php5-cgi, php5-sqlite, php7.0-xml, php7.0-imap, php7.0-recode, php-pear, libapache2-mod-php5filter, php5-dev, php7.0-bz2, php7.0-dev, php7.0-snmp, php5-gd, php7.0-soap, php7.0-readline, php5-xsl, libapache2-mod-php7.0, libapache2-mod-php5, libphp5-embed, php5-mysql, php7.0-phpdbg, php5-common, libphp7.0-embed, php5-fpm, php7.0-sqlite3, php7.0-curl, php5-cli, php5-gmp, php7.0-xsl, php7.0-sybase