USN-4794-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4794-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4794-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4794-1
Related
Published
2021-03-15T21:15:46.515352Z
Modified
2021-03-15T21:15:46.515352Z
Summary
libupnp vulnerabilities
Details

Matthew Garrett discovered that libupnp mishandled POST requests by default. An attacker could use this vulnerability to write files to arbitrary locations in the victim's filesystem, possibly as root. (CVE-2016-6255)

It was discovered that libupnp mishandled certain input. A remote attacker could use this vulnerability to cause a denial of service (crash) or possibly execute arbitrary code. (CVE-2016-8863)

References

Affected packages

Ubuntu:Pro:16.04:LTS / libupnp

Package

Name
libupnp
Purl
pkg:deb/ubuntu/libupnp@1:1.6.19+git20160116-1ubuntu0.1~esm1?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.6.19+git20160116-1ubuntu0.1~esm1

Affected versions

1:1.*

1:1.6.19+git20141001-1
1:1.6.19+git20141001-1ubuntu1
1:1.6.19+git20160116-1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "libupnp6": "1:1.6.19+git20160116-1ubuntu0.1~esm1",
            "libupnp6-dev": "1:1.6.19+git20160116-1ubuntu0.1~esm1",
            "libupnp6-dbgsym": "1:1.6.19+git20160116-1ubuntu0.1~esm1",
            "libupnp6-doc": "1:1.6.19+git20160116-1ubuntu0.1~esm1",
            "libupnp6-dev-dbgsym": "1:1.6.19+git20160116-1ubuntu0.1~esm1",
            "libupnp6-dbg": "1:1.6.19+git20160116-1ubuntu0.1~esm1",
            "libupnp-dev": "1:1.6.19+git20160116-1ubuntu0.1~esm1"
        }
    ]
}