Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6470-1

Ubuntu Security Notice 6470-1 - It was discovered that Axis incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code.

Packet Storm
#vulnerability#ubuntu#dos#java

==========================================================================
Ubuntu Security Notice USN-6470-1
November 02, 2023

axis vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 23.10
  • Ubuntu 23.04
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS (Available with Ubuntu Pro)
  • Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Axis could be made to crash or execute arbitrary code if it received specially
crafted input.

Software Description:

  • axis: SOAP implementation in Java

Details:

It was discovered that Axis incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to cause a denial of service
or execute arbitrary code. (CVE-2023-40743)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
libaxis-java 1.4-28+deb10u1build0.23.10.1
libaxis-java-doc 1.4-28+deb10u1build0.23.10.1

Ubuntu 23.04:
libaxis-java 1.4-28+deb10u1build0.23.04.1
libaxis-java-doc 1.4-28+deb10u1build0.23.04.1

Ubuntu 22.04 LTS:
libaxis-java 1.4-28+deb10u1build0.22.04.1
libaxis-java-doc 1.4-28+deb10u1build0.22.04.1

Ubuntu 20.04 LTS:
libaxis-java 1.4-28+deb10u1build0.20.04.1
libaxis-java-doc 1.4-28+deb10u1build0.20.04.1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
libaxis-java 1.4-25ubuntu0.1~esm1
libaxis-java-doc 1.4-25ubuntu0.1~esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
libaxis-java 1.4-24ubuntu0.1~esm1
libaxis-java-doc 1.4-24ubuntu0.1~esm1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6470-1
CVE-2023-40743

Package Information:
https://launchpad.net/ubuntu/+source/axis/1.4-28+deb10u1build0.23.10.1
https://launchpad.net/ubuntu/+source/axis/1.4-28+deb10u1build0.23.04.1
https://launchpad.net/ubuntu/+source/axis/1.4-28+deb10u1build0.22.04.1
https://launchpad.net/ubuntu/+source/axis/1.4-28+deb10u1build0.20.04.1

Related news

CVE-2023-40743: Filter out unsupported protocols in the client class ServiceFactory · apache/axis-axis1-java@7e66753

** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE. As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.

Packet Storm: Latest News

Zeek 6.0.8