Tuesday, September 15, 2020

[USN-4494-1] GUPnP vulnerability

-----BEGIN PGP SIGNATURE-----
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=ryXX
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-4494-1
September 15, 2020

gupnp vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

gupnp could be made to expose sensitive information or perform network
attacks if it received specially crafted network traffic.

Software Description:
- gupnp: framework for creating UPnP devices and control points

Details:

It was discovered that GUPnP incorrectly handled certain subscription
requests. A remote attacker could possibly use this issue to exfiltrate
data or use GUPnP to perform DDoS attacks.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
libgupnp-1.2-0 1.2.3-0ubuntu0.20.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://usn.ubuntu.com/4494-1
CVE-2020-12695

Package Information:
https://launchpad.net/ubuntu/+source/gupnp/1.2.3-0ubuntu0.20.04.1

No comments:

Post a Comment