-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2020.3697
USN-4600-2: Netty vulnerabilities
28 October 2020
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Netty
Publisher: Ubuntu
Operating System: Ubuntu
Impact/Access: Denial of Service -- Remote/Unauthenticated
Access Confidential Data -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2020-11612 CVE-2019-20445 CVE-2019-20444
Reference: ESB-2020.3655
ESB-2020.3243
ESB-2020.3049
Original Bulletin:
https://usn.ubuntu.com/4600-2/
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-4600-2: Netty vulnerabilities
27 October 2020
netty could be made to crash or run programs if it received
specially crafted network traffic.
Releases
o Ubuntu 18.04 LTS
Packages
o netty - None
Details
USN-4600-1 fixed multiple vunerabilities in Netty 3.9. This update provides
the corresponding fixes for CVE-2019-20444, CVE-2019-20445 for Netty.
Also it was discovered that Netty allow for unbounded memory allocation. A
remote attacker could send a large stream to the Netty server causing it to
crash (denial of service). (CVE-2020-11612)
Original advisory details:
It was discovered that Netty had HTTP request smuggling vulnerabilities. A
remote attacker could used it to extract sensitive information.
(CVE-2019-16869,
CVE-2019-20444, CVE-2019-20445, CVE-2020-7238)
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 18.04
o libnetty-java - 1:4.1.7-4ubuntu0.1
In general, a standard system update will make all the necessary changes.
References
o CVE-2019-20444
o CVE-2020-11612
o CVE-2019-20445
Related notices
o USN-4600-1 : netty-3.9, libnetty-3.9-java
o USN-4532-1 : netty-3.9, libnetty-3.9-java
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=Mzxq
-----END PGP SIGNATURE-----
The post ESB-2020.3697 – [Ubuntu] Netty: Multiple vulnerabilities appeared first on Malware Devil.
https://malwaredevil.com/2020/10/28/esb-2020-3697-ubuntu-netty-multiple-vulnerabilities-2/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3697-ubuntu-netty-multiple-vulnerabilities-2
No comments:
Post a Comment