First published: Tue Sep 15 2020(Updated: )
It was discovered that Apache XML-RPC (aka ws-xmlrpc) does not properly deserialize untrusted data. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-17570)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libxmlrpc3-client-java | <3.1.3-9+deb10u1build0.18.04.1 | 3.1.3-9+deb10u1build0.18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libxmlrpc3-common-java | <3.1.3-9+deb10u1build0.18.04.1 | 3.1.3-9+deb10u1build0.18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libxmlrpc3-server-java | <3.1.3-9+deb10u1build0.18.04.1 | 3.1.3-9+deb10u1build0.18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libxmlrpc3-client-java | <3.1.3-7+deb8u1build0.16.04.1 | 3.1.3-7+deb8u1build0.16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libxmlrpc3-common-java | <3.1.3-7+deb8u1build0.16.04.1 | 3.1.3-7+deb8u1build0.16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libxmlrpc3-server-java | <3.1.3-7+deb8u1build0.16.04.1 | 3.1.3-7+deb8u1build0.16.04.1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4496-1 is critical due to potential remote code execution vulnerabilities.
To fix USN-4496-1, upgrade the affected packages to the latest versions provided in the Ubuntu security advisory.
USN-4496-1 affects libxmlrpc3-client-java, libxmlrpc3-common-java, and libxmlrpc3-server-java on Ubuntu 16.04 and 18.04.
The issue in USN-4496-1 is resolved by updating to version 3.1.3-9+deb10u1build0.18.04.1 for Ubuntu 18.04 or 3.1.3-7+deb8u1build0.16.04.1 for Ubuntu 16.04.
Yes, USN-4496-1 is specifically applicable to Ubuntu 16.04 and 18.04.