First published: Mon Jul 01 2019(Updated: )
Fix vulnerability where an authenticated non-admin users could load a module with a crafted name, then escalate privileges and run arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/znc | <1.7.2-2ubuntu0.1 | 1.7.2-2ubuntu0.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/znc | <1.7.1-2ubuntu0.2 | 1.7.1-2ubuntu0.2 |
Ubuntu OpenSSH Client | =18.10 | |
All of | ||
ubuntu/znc | <1.6.6-1ubuntu0.2 | 1.6.6-1ubuntu0.2 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/znc | <1.6.3-1ubuntu0.2 | 1.6.3-1ubuntu0.2 |
Ubuntu OpenSSH Client | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-4044-1 is classified as a high severity vulnerability that allows privilege escalation for authenticated non-admin users.
To fix USN-4044-1, upgrade the znc package to version 1.7.2-2ubuntu0.1 or later for Ubuntu 19.04, 1.7.1-2ubuntu0.2 or later for Ubuntu 18.10, 1.6.6-1ubuntu0.2 or later for Ubuntu 18.04, or 1.6.3-1ubuntu0.2 or later for Ubuntu 16.04.
USN-4044-1 affects users of the znc package on specific Ubuntu versions, including 19.04, 18.10, 18.04, and 16.04.
USN-4044-1 addresses an attack vector that allows authenticated non-admin users to execute arbitrary code through crafted module names.
There are no known workarounds for USN-4044-1, so upgrading to the patched versions is the recommended solution.