xmlrpc-epi vulnerability

Related Vulnerabilities: CVE-2016-6296  

xmlrpc-epi could be made to crash or run programs if it processed specially crafted data.

It was discovered that xmlrpc-epi incorrectly handled lengths in the simplestring_addn function. A remote attacker could use this issue to cause applications using xmlrpc-epi such as PHP to crash, resulting in a denial of service, or possibly execute arbitrary code.

10 August 2016

xmlrpc-epi vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS

Summary

xmlrpc-epi could be made to crash or run programs if it processed specially crafted data.

Software Description

  • xmlrpc-epi - a XML-RPC request library

Details

It was discovered that xmlrpc-epi incorrectly handled lengths in the simplestring_addn function. A remote attacker could use this issue to cause applications using xmlrpc-epi such as PHP to crash, resulting in a denial of service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS
libxmlrpc-epi0 - 0.54.2-1.1ubuntu0.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References