|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu: Security Advisory for yaws (USN-4569-1)|
|Summary:||The remote host is missing an update for the 'yaws'; package(s) announced via the USN-4569-1 advisory.|
The remote host is missing an update for the 'yaws'
package(s) announced via the USN-4569-1 advisory.
It was discovered that Yaws did not properly sanitize XML input. A remote
attacker could use this vulnerability to execute an XML External Entity
(XXE) injection attack. (CVE-2020-24379)
It was discovered that Yaws mishandled certain input when running CGI
scripts. A remote attacker could use this vulnerability to execute
arbitrary commands. (CVE-2020-24916)
'yaws' package(s) on Ubuntu 18.04 LTS.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2020-24379|
Common Vulnerability Exposure (CVE) ID: CVE-2020-24916
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.