Risk | High |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2015-0261 CVE-2015-2153 CVE-2015-2154 CVE-2015-2155 |
CWE-ID | CWE-125 CWE-787 CWE-20 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #2 is available. |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU7689
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-0261
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code.
The weakness exists due to integer signedness error in the mobility_opt_print function in the IPv6 mobility printer A remote attacker can supply a negative length value, trigger out-of-bounds read, cause the system crash and possibly execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise
Update the affected packages
Ubuntu: 12.04 - 14.04
CPE2.3 External linkshttps://www.ubuntu.com/usn/usn-2580-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7688
Risk: High
CVSSv4.0: 8.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2015-2153
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code.
The weakness exists due to an error in the rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer. A remote attacker can supply a specially crafted header length in an RPKI-RTR Protocol Data Unit (PDU), trigger out-of-bounds read or write and cause the system crash or execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
Update the affected packages
Ubuntu: 12.04 - 14.04
CPE2.3https://www.ubuntu.com/usn/usn-2580-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU7687
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2015-2154
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to an error in the osi_print_cksum function in print-isoclns.c in the ethernet printer. A remote attacker can send a specially crafted length offset or base pointer checksum value, trigger out-of-bounds read and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
Update the affected packages
Ubuntu: 12.04 - 14.04
CPE2.3https://www.ubuntu.com/usn/usn-2580-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7686
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-2155
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code.
The weakness exists due to an error in the Force printer. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may result in system compromise.
Update the affected packages
Ubuntu: 12.04 - 14.04
CPE2.3https://www.ubuntu.com/usn/usn-2580-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.