[USN-3533-1] Transmission vulnerability

Leonidas S. Barbosa leo.barbosa at canonical.com
Tue Jan 16 21:04:50 UTC 2018


==========================================================================
Ubuntu Security Notice USN-3533-1
January 16, 2018

transmission vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Transmission could be made to run arbitraty code.

Software Description:
- transmission: lightweight BitTorrent client

Details:

It was discovered that Transmission incorrectly handled certain POST
requests to the RPC server and allowed DNS rebinding attack. An
attacker could possibly use this issue to execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
  transmission                    2.92-2ubuntu3.1

Ubuntu 16.04 LTS:
  transmission                    2.84-3ubuntu3.1

Ubuntu 14.04 LTS:
  transmission                    2.82-1.1ubuntu3.2

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3533-1
  CVE-2018-5702

Package Information:
  https://launchpad.net/ubuntu/+source/transmission/2.92-2ubuntu3.1
  https://launchpad.net/ubuntu/+source/transmission/2.84-3ubuntu3.1
  https://launchpad.net/ubuntu/+source/transmission/2.82-1.1ubuntu3.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20180116/a72aec39/attachment.sig>


More information about the ubuntu-security-announce mailing list