Apache XML-RPC vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
* Ubuntu 18.04 LTS
* Ubuntu 16.04 LTS
Summary
Apache XML-RPC could be made to execute arbitrary code if it
received specially crafted data by a malicious XML-RPC server.
Software Description
* libxmlrpc3-java - XML-RPC implementation in Java
Details
It was discovered that Apache XML-RPC (aka ws-xmlrpc) does not
properly deserialize untrusted data. An attacker could possibly
use this issue to execute arbitrary code. (CVE-2019-17570)
Update instructions
The problem can be corrected by updating your system to the
following package versions:
Ubuntu 18.04 LTS
libxmlrpc3-client-java - 3.1.3-9+deb10u1build0.18.04.1
libxmlrpc3-common-java - 3.1.3-9+deb10u1build0.18.04.1
libxmlrpc3-server-java - 3.1.3-9+deb10u1build0.18.04.1
Ubuntu 16.04 LTS
libxmlrpc3-client-java - 3.1.3-7+deb8u1build0.16.04.1
libxmlrpc3-common-java - 3.1.3-7+deb8u1build0.16.04.1
libxmlrpc3-server-java - 3.1.3-7+deb8u1build0.16.04.1
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary
changes.
References
* CVE-2019-17570
--- Mystic BBS v1.12 A46 (Linux/64)
* Origin: BZ&BZ BBS (21:4/110)