First published: Mon Jun 20 2016(Updated: )
It was discovered that the Expat code in XML-RPC for C and C++ unexpectedly called srand in certain circumstances. This could reduce the security of calling applications. (CVE-2012-6702) It was discovered that the Expat code in XML-RPC for C and C++ incorrectly handled seeding the random number generator. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2016-5300) Gustavo Grieco discovered that the Expat code in XML-RPC for C and C++ incorrectly handled malformed XML data. If a user or application linked against XML-RPC for C and C++ were tricked into opening a crafted XML file, an attacker could cause a denial of service, or possibly execute arbitrary code. (CVE-2016-0718) It was discovered that the Expat code in XML-RPC for C and C++ incorrectly handled malformed XML data. If a user or application linked against XML-RPC for C and C++ were tricked into opening a crafted XML file, an attacker could cause a denial of service, or possibly execute arbitrary code. (CVE-2015-1283, CVE-2016-4472)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libxmlrpc-c++4 | <1.16.33-3.1ubuntu5.2 | 1.16.33-3.1ubuntu5.2 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/libxmlrpc-core-c3 | <1.16.33-3.1ubuntu5.2 | 1.16.33-3.1ubuntu5.2 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for XML-RPC for C and C++ vulnerabilities is CVE-2012-6702.
The vulnerability CVE-2012-6702 can reduce the security of calling applications.
The version 1.16.33-3.1ubuntu5.2 of libxmlrpc-c++4 is affected by the vulnerability CVE-2012-6702.
To fix the vulnerability CVE-2012-6702 in libxmlrpc-c++4, you need to update to version 1.16.33-3.1ubuntu5.2 or later.
Yes, you can find additional information about the vulnerability CVE-2012-6702 at the following references: [https://ubuntu.com/security/CVE-2012-6702](https://ubuntu.com/security/CVE-2012-6702), [https://ubuntu.com/security/CVE-2015-1283](https://ubuntu.com/security/CVE-2015-1283), [https://ubuntu.com/security/CVE-2016-0718](https://ubuntu.com/security/CVE-2016-0718).