Ubuntu Security Notice 2780-1 - Aleksandar Nikolic discovered a buffer overflow vulnerability in the XML parser functionality of the MiniUPnP library. A remote attacker could use this to cause a denial of service (application crash) or possibly execute arbitrary code with privileges of the user running an application that uses the MiniUPnP library.
afd5865ef1963ee7a26e07db611c821c91f0a869b605a50e748e72c46647c46f
Content-Disposition: inline
==========================================================================Ubuntu Security Notice USN-2780-1
October 20, 2015
miniupnpc vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
An application using the MiniUPnP library could be made to crash or
run programs as your login if it received specially crafted network
traffic.
Software Description:
- miniupnpc: UPnP IGD client lightweight library
Details:
Aleksandar Nikolic discovered a buffer overflow vulnerability in the
XML parser functionality of the MiniUPnP library. A remote attacker
could use this to cause a denial of service (application crash) or
possibly execute arbitrary code with privileges of the user running
an application that uses the MiniUPnP library.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
libminiupnpc10 1.9.20140610-2ubuntu1.1
Ubuntu 14.04 LTS:
libminiupnpc8 1.6-3ubuntu2.14.04.2
Ubuntu 12.04 LTS:
libminiupnpc8 1.6-3ubuntu1.2
After a standard system update you need to restart applications using
the MiniUPnP library to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2780-1
CVE-2015-6031
Package Information:
https://launchpad.net/ubuntu/+source/miniupnpc/1.9.20140610-2ubuntu1.1
https://launchpad.net/ubuntu/+source/miniupnpc/1.6-3ubuntu2.14.04.2
https://launchpad.net/ubuntu/+source/miniupnpc/1.6-3ubuntu1.2