First published: Wed Mar 28 2018(Updated: )
Bas van Schaik and Kevin Backhouse discovered that librelp incorrectly handled checking certain x509 certificates. A remote attacker able to connect to rsyslog could possibly use this issue to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/librelp0 | <1.2.2-2ubuntu1.1 | 1.2.2-2ubuntu1.1 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identified as USN-3612-1 is a librelp vulnerability.
The USN-3612-1 vulnerability allows a remote attacker to execute arbitrary code by exploiting a flaw in how librelp handles checking certain x509 certificates.
The version 1.2.2-2ubuntu1.1 of librelp is affected by the USN-3612-1 vulnerability.
To fix the USN-3612-1 vulnerability, it is recommended to upgrade to version 1.2.2-2ubuntu1.1 of librelp.
You can find more information about the USN-3612-1 vulnerability at the following references: [USN-3612-1](https://ubuntu.com/security/notices/USN-4828-1), [CVE-2018-1000140](https://ubuntu.com/security/CVE-2018-1000140), [librelp](https://launchpad.net/ubuntu/+source/librelp/1.2.2-2ubuntu1.1).