First published: Mon Sep 10 2012(Updated: )
USN-1527-1 fixed vulnerabilities in Expat. This update provides the corresponding updates for XML-RPC for C and C++. Both issues described in the original advisory affected XML-RPC for C and C++ in Ubuntu 10.04 LTS, 11.04, 11.10 and 12.04 LTS. Original advisory details: It was discovered that Expat computed hash values without restricting the ability to trigger hash collisions predictably. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service by consuming excessive CPU resources. (CVE-2012-0876) Tim Boddy discovered that Expat did not properly handle memory reallocation when processing XML files. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service by consuming excessive memory resources. This issue only affected Ubuntu 8.04 LTS, 10.04 LTS, 11.04 and 11.10. (CVE-2012-1148)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libxmlrpc-core-c3 | <1.16.33-3.1ubuntu5.1 | 1.16.33-3.1ubuntu5.1 |
Ubuntu Ubuntu | =12.04 | |
All of | ||
ubuntu/libxmlrpc-core-c3-0 | <1.16.32-0ubuntu4.1 | 1.16.32-0ubuntu4.1 |
Ubuntu Ubuntu | =11.10 | |
All of | ||
ubuntu/libxmlrpc-core-c3-0 | <1.16.32-0ubuntu3.1 | 1.16.32-0ubuntu3.1 |
Ubuntu Ubuntu | =11.04 | |
All of | ||
ubuntu/libxmlrpc-core-c3 | <1.06.27-1ubuntu7.1 | 1.06.27-1ubuntu7.1 |
Ubuntu Ubuntu | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is USN-1527-2.
The vulnerabilities affect XML-RPC for C and C++ in Ubuntu 10.04 LTS, 11.04, 11.10, and 12.04 LTS.
The severity of the vulnerabilities is not specified in the advisory.
To fix the vulnerabilities, update the affected software to the specified versions: libxmlrpc-core-c3 1.16.33-3.1ubuntu5.1 for Ubuntu 12.04 LTS, libxmlrpc-core-c3-0 1.16.32-0ubuntu4.1 for Ubuntu 11.10, libxmlrpc-core-c3-0 1.16.32-0ubuntu3.1 for Ubuntu 11.04, and libxmlrpc-core-c3 1.06.27-1ubuntu7.1 for Ubuntu 10.04.
You can find more information about the vulnerabilities in the original advisory: [USN-1527-1](https://ubuntu.com/security/notices/USN-1527-1).