USN-4794-1: libupnp vulnerabilities
15 March 2021
Several security issues were fixed in libupnp.
Releases
Packages
- libupnp - A Portable Open Source UPnP Development Kit
Details
Matthew Garrett discovered that libupnp mishandled POST requests by
default. An attacker could use this vulnerability to write files to
arbitrary locations in the victim's filesystem, possibly as root.
(CVE-2016-6255)
It was discovered that libupnp mishandled certain input. A remote attacker
could use this vulnerability to cause a denial of service (crash) or
possibly execute arbitrary code. (CVE-2016-8863)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
libupnp6
-
1:1.6.19+git20160116-1ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.