| VID |
14256 |
| Severity |
40 |
| Port |
22 |
| Protocol |
TCP |
| Class |
LSC |
| Detailed Description |
The remote system does not apply USN-4129-1 which is curl security update. The system which does not apply the update is affected by the following vulnerabilities:
- curl incorrectly handled memory when using Kerberos over FTP. A remote attacker could use this issue to crash curl, resulting in a denial of service. (CVE-2019-5481)
- curl incorrectly handled memory during TFTP transfers. A remote attacker could use this issue to crash curl, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2019-5482)
Note: This check solely relied on the curl DPKG version of the remote system to assess this vulnerability, so this might be a false positive.
* References: https://usn.ubuntu.com/4129-1/
* Platforms Affected: Ubuntu 16.04 LTS Ubuntu 18.04 LTS |
| Recommendation |
For a command line interface, use the following command to update the operating system: # apt-get upgrade |
| Related URL |
CVE-2019-5481,CVE-2019-5482 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|