Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 2827-1] libcommons-fileupload-java security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 2827-1] libcommons-fileupload-java security update


Chronologisch Thread 
  • From: Salvatore Bonaccorso <carnil AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 2827-1] libcommons-fileupload-java security update
  • Date: Tue, 24 Dec 2013 05:38:15 +0000
  • List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
  • List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
  • Old-return-path: <carnil AT master.debian.org>
  • Priority: urgent
  • Resent-date: Tue, 24 Dec 2013 05:38:34 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <xv7laor0u9I.A.SMB.a3RuSB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2827-1 security AT debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
December 24, 2013 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libcommons-fileupload-java
Vulnerability : arbitrary file upload via deserialization
Problem type : local (remote)
Debian-specific: no
CVE ID : CVE-2013-2186
Debian Bug : 726601

It was discovered that Apache Commons FileUpload, a package to make it
easy to add robust, high-performance, file upload capability to servlets
and web applications, incorrectly handled file names with NULL bytes in
serialized instances. A remote attacker able to supply a serialized
instance of the DiskFileItem class, which will be deserialized on a
server, could use this flaw to write arbitrary content to any location
on the server that is accessible to the user running the application
server process.

For the oldstable distribution (squeeze), this problem has been fixed in
version 1.2.2-1+deb6u1.

For the stable distribution (wheezy), this problem has been fixed in
version 1.2.2-1+deb7u1.

For the testing distribution (jessie), this problem has been fixed in
version 1.3-2.1.

For the unstable distribution (sid), this problem has been fixed in
version 1.3-2.1.

We recommend that you upgrade your libcommons-fileupload-java packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)

iQIcBAEBCgAGBQJSuR2NAAoJEAVMuPMTQ89E6s0P/1gU0HVBSy+C3Tvr0KejOcEx
H0wKOV1JuVbS2b3fKvX4xtgRU2RlZQeIvdH8qUs56ireymC8p0al1DtWQbNRLjZP
dyVFq3h4IGh/bNtvG8n5yppqcO9amwbaDMDwan3208ZIfAE+AULj+JBGXYSpE75z
XppPhATYPZ8zkG23GkufQ4/+vKivT3iLgoQ2YfO/aSU5Ondp0pUB+RP3GlOhXskl
y6cAQZDOEqcTJslJML7WwnVp4/WGxHyvoD0RRrocdy4fzzf+pWw62T4foogVwz/6
UyX2WEcZO78jGbU5+vlKc8D3N8mv6ZRNSW6GZOslND8XSCJlWBbHWTWq0f6TgTM7
eYCMKpSzASrSbFXmZmnMsQfcX6tbsngF6DA3ZK1bT5LIHCo0BAJsR2fI3oWXOn8V
H3rh/L6JOzviVBrp4MkRYDiafg8gpvCIRB8OhuSsIWt++ZmMvVFLRXuVb/sltNhH
ee51WoZ0hRzSGxhs/M8Uob7X+wF/vc/FMp/QLIWlSy1CTa5GpDncRp5zebXXeXh2
7iezihfmm9fXx6Rlre3BAkCZuKbYosMZ4fjuR6W2wVHFbIGmaOMKD3oXhmmYbxky
qR1S4yEqsV3dPNLBfCPLlOu8ZvzIBr1A8guWKoAdZSqe8ziUF4RFhGGCFboBWqvL
uDDYBO1IxsANMl3+Xhbw
=PBof
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST AT lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster AT lists.debian.org
Archive: E1VvKh5-0006dC-FQ AT master.debian.org">http://lists.debian.org/E1VvKh5-0006dC-FQ AT master.debian.org




  • [IT-SecNots] [SECURITY] [DSA 2827-1] libcommons-fileupload-java security update, Salvatore Bonaccorso, 24.12.2013

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang