MGASA-2020-0077

Source
https://advisories.mageia.org/MGASA-2020-0077.html
Import Source
https://advisories.mageia.org/MGASA-2020-0077.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0077
Related
Published
2020-02-09T19:13:40Z
Modified
2026-02-04T03:32:18.308830Z
Summary
Updated xmlrpc packages fix security vulnerability
Details

A flaw was discovered where the XMLRPC client implementation in Apache XMLRPC, performed deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious or compromised XMLRPC server could possibly use this flaw to execute arbitrary code with the privileges of an application using the Apache XMLRPC client library (CVE-2019-17570).

References
Credits

Affected packages

Mageia:7 / xmlrpc

Package

Name
xmlrpc
Purl
pkg:rpm/mageia/xmlrpc?arch=source&distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.3-73.1.mga7

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2020-0077.json"