Date: 15 November 2012
References: ESB-2012.0530 ESB-2012.0693 ESB-2012.0726 ESB-2012.0801 ESB-2012.0822 ESB-2012.0915 ESB-2012.0916 ESB-2012.0930 ESB-2012.0933 ESB-2012.0936 ESB-2012.0937 ESB-2012.0944 ESB-2012.0976 ESB-2012.1014 ESB-2012.1040 ESB-2012.1076 ESB-2012.1116 ESB-2012.1189 ESB-2012.1192 ESB-2012.1210 ESB-2013.0057 ESB-2013.0096 ESB-2013.0220 ESB-2013.0221 ESB-2013.0301 ESB-2013.0470 ESB-2013.0547 ESB-2013.0610
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2012.1044.2
Security Vulnerabilities fixed in IBM WebSphere Application Server 8.5.0.1
15 November 2012
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: IBM WebSphere Application Server
Publisher: IBM
Operating System: AIX
HP-UX
Linux variants
Solaris
Windows
Impact/Access: Administrator Compromise -- Existing Account
Increased Privileges -- Remote with User Interaction
Modify Arbitrary Files -- Remote with User Interaction
Overwrite Arbitrary Files -- Remote with User Interaction
Denial of Service -- Remote/Unauthenticated
Cross-site Scripting -- Remote with User Interaction
Access Confidential Data -- Remote with User Interaction
Reduced Security -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2012-4853 CVE-2012-4851 CVE-2012-4850
CVE-2012-3330 CVE-2012-3325 CVE-2012-3311
CVE-2012-3306 CVE-2012-3305 CVE-2012-3304
CVE-2012-3293 CVE-2012-2191 CVE-2012-2190
CVE-2012-2159
Reference: ESB-2012.1040
ESB-2012.1014
ESB-2012.0976
ESB-2012.0944
ESB-2012.0937
ESB-2012.0936
ESB-2012.0933
ESB-2012.0930
ESB-2012.0916
ESB-2012.0915
ESB-2012.0822
ESB-2012.0801
ESB-2012.0726
ESB-2012.0693
ESB-2012.0530
Original Bulletin:
http://www-01.ibm.com/support/docview.wss?uid=swg21614265
Revision History: November 15 2012: Updated CVE number for PM67082 and added PM68643
October 31 2012: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
Security Vulnerabilities fixed in IBM WebSphere Application Server 8.5.0.1
Flash (Alert)
Document information
WebSphere Application Server
General
Software version: 8.5
Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows, i5/OS, z/OS
Software edition: Base, Developer, Express, Network Deployment
Reference #: 1614265
Modified date: 2012-10-30
Abstract
Cross reference list for security vulnerabilities fixed in IBM WebSphere
Application Server Fix Pack 8.5.0.1 Content
VULNERABILITY DETAILS:
CVE ID: CVE-2012-3304 (PM54356)
DESCRIPTION: WebSphere Application Server could allow a remote attacker to
hijack a valid users session, caused by an error in the Administrative
Console. An attacker could exploit this vulnerability to gain privileges of
the victim.
CVSS:
CVSS Base Score: 6.8 CVSS Temporal Score: See
http://xforce.iss.net/xforce/xfdb/77476 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:P/I:P/A:P)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix:
Apply a Fix Pack or PTF containing this APAR PM54356, as noted below:
For IBM WebSphere Application Server :
For V8.5: o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted
to be available 12 November 2012).
For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.
For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later.
Workaround(s): None
Mitigation(s): none
CVE ID: CVE-2012-3293 (PM60839)
DESCRIPTION: WebSphere Application Server Administrative Console could allow a
cross-frame scripting attack, caused by improper validation of input in the
Administrative Console. A remote attacker could exploit this vulnerability to
monitor and capture user activity.
CVSS:
CVSS Base Score: 4.3 CVSS Temporal Score:
Seehttp://xforce.iss.net/xforce/xfdb/77179 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix: Apply a Fix Pack or PTF containing this APAR PM60839, as noted below:
For IBM WebSphere Application Server
For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.3: o Install Fix Pack 4 (8.0.0.4), or later.
For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.
For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later.
Workaround(s): None
Mitigation(s): When you have the Administrator Console open, do not use your
web browser to visit other websites. Open another web browser to visit other
websites.
CVE ID: CVE-2012-3311 (PM61388)
DESCRIPTION: WebSphere Application Server, when running on z/OS could allow a
local attacker to bypass security restrictions, caused by a failure to perform
CBIND checks when using Federated Repositories for IIOP connections using
Optimized Local Adapters. An attacker could exploit this vulnerability via a
client application to access or modify application data.
CVSS:
CVSS Base Score: 3 CVSS Temporal Score:
Seehttp://xforce.iss.net/xforce/xfdb/77697 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:L/AC:M/Au:S/C:P/I:P/A:N)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for z/OS
operating system Versions are affected: Version 8.5 Version 8 Version 7
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix: Apply a Fix Pack or PTF containing this APAR PM61388, as noted below:
For IBM WebSphere Application Server
For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.4: o Install Fix Pack 4 (8.0.0.5), or later (targeted
to be available 12 November 2012).
For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.
For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later.
Workaround(s): None
Mitigation(s): None
CVE ID: CVE-2012-3305 (PM62467)
DESCRIPTION: WebSphere Application Server could allow a remote attacker to
traverse directories on the system. An attacker could exploit this
vulnerability by deploying a specially-crafted application file to overwrite
files outside of the application deployment directory.
CVSS:
CVSS Base Score: 5.8 CVSS Temporal Score:
Seehttp://xforce.iss.net/xforce/xfdb/77477 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:P)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix: Apply a Fix Pack or PTF containing this APAR PM62467, as noted below:
For IBM WebSphere Application Server
For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted
to be available 12 November 2012).
For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.
For V6.1.0 through 6.1.0.45: o Install Fix Pack 47 (6.1.0.47), or later (check
back for target date)
Workaround(s): None
Mitigation(s): none
CVE ID: CVE-2012-4853 (PM62920)
DESCRIPTION: WebSphere Application Server is vulnerable to cross-site request
forgery, caused by improper validation of user-supplied input. By persuading
an authenticated user to visit a malicious Web site, a remote attacker could
exploit this vulnerability to obtain sensitive information.
CVSS:
CVSS Base Score: 4.3 CVSS Temporal Score:
Seehttp://xforce.iss.net/xforce/xfdb/79598 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix: Apply a Fix Pack or PTF containing this APAR PM62920, as noted below:
For IBM WebSphere Application Server
For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.5: o Install Fix Pack 6 (8.0.0.6), or later (targeted
to be available 29 April 2013).
For V7.0 through 7.0.0.25: o Install Fix Pack 27 (7.0.0.25), or later
(targeted to be available 21 January 2013).
For V6.1.0 through 6.1.0.45: o Install Fix Pack 47 (6.1.0.47), or later (check
back for target date)
Workaround(s): None
Mitigation(s): none
CVE ID: CVE-2012-2190 and CVE-2012-2191 (PM66218)
DESCRIPTION: IBM HTTP Server may be vulnerable to a denial of service. By
sending a specially-crafted Secure Sockets Layer (SSL) packets to the
vulnerable Web server, a remote attacker could cause a segmentation fault.
CVE-2012-2190 CVSS:
CVSS Base Score: 5.0 CVSS Temporal Score:
Seehttp://xforce.iss.net/xforce/xfdb/75994 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2012-2191 CVSS:
CVSS Base Score: 5.0 CVSS Temporal Score:
Seehttp://xforce.iss.net/xforce/xfdb/75996 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix: Apply a Fix Pack or PTF containing this APAR PM66218, as noted below:
For IBM WebSphere Application Server :
For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.3: o Install Fix Pack 4 (8.0.0.4), or later.
For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.
For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later.
Workaround(s): None
Mitigation(s): None
CVE ID: CVE-2012-2159 (PM62795 or PM66410)
DESCRIPTION: WebSphere Application Server could allow a cross-site scripting
attack, caused by improper validation of input by the help system in the
Administrative Console. A remote attacker could exploit this vulnerability
using a specially-crafted URL to inject script in a victim's Web browser
within the security context of the hosting Web site.
CVSS:
CVSS Base Score: 4.3 CVSS Temporal Score:
Seehttp://xforce.iss.net/xforce/xfdb/74832 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected: Version 8.5 Version 8
REMEDIATION: The recommended solution is to apply the Fix Pack for each named
product as soon as practical
Fix: Apply a Fix Pack or PTF containing this APAR PM62795 or PM66410, as noted
below:
For IBM WebSphere Application Server :
For V8.5 (PM66410) : o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.3 (PM62795): o Install Fix Pack 4 (8.0.0.4), or later.
Workaround(s): None
Mitigation(s): Remove iehs.war from isclite.ear
CVE ID: CVE-2012-3306 (PM66514)
DESCRIPTION: WebSphere Application Server could provide weaker than expected
security caused by a failure to purge passwords from the authentication cache
when multi domain support is enabled.
CVSS:
CVSS Base Score: 4.3 CVSS Temporal Score: See
http://xforce.iss.net/xforce/xfdb/77478 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected: Version 8.5 Version 8 Version 7
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix:
Apply a Fix Pack or PTF containing this APAR PM66514, as noted below:
For IBM WebSphere Application Server :
For V8.5: o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted
to be available 12 November 2012).
For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.
For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later.
Workaround(s): None
Mitigation(s): none
CVE ID: CVE-2012-4850 (PM67082)
DESCRIPTION: WebSphere Application Server V8.5 Liberty Profile when using
JAX-RS could allow a remote attacker to gain eleveated privileges on the
server caused by incorrect request validation.
CVSS:
CVSS Base Score: 7.5 CVSS Temporal Score: See
http://xforce.iss.net/xforce/xfdb/79539 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:P/I:P/A:P )
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected: Version 8.5 Liberty Profile only
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix:
Apply a Fix Pack or PTF containing this APAR PM67082, as noted below:
For IBM WebSphere Application Server :
For V8.5: o Install Fix Pack 1 (8.5.0.1), or later.
Workaround(s): None
Mitigation(s): none
CVE ID: CVE-2012-4851 (PM68643)
DESCRIPTION: WebSphere Application Server V8.5 Liberty Profile could allow a
cross-site scripting attack, caused by improper validation of the URI. A
remote attacker could exploit this vulnerability using a specially-crafted URL
to inject script in a victim's Web browser withing the security context of the
hosting Web site. CVSS:
CVSS Base Score: 4.3 CVSS Temporal Score: See
http://xforce.iss.net/xforce/xfdb/79541 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N )
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected: Version 8.5 Liberty Profile only
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for
each named product as soon as practical Fix:
Apply a Fix Pack or PTF containing this APAR PM68643, as noted below:
For IBM WebSphere Application Server :
For V8.5: o Install Fix Pack 1 (8.5.0.1), or later.
Workaround(s): None
Mitigation(s): none
CVE ID: CVE-2012-3325 (PM71296)
DESCRIPTION: If you have installed an Interim Fix for PM44303, or a fix pack
containing PM44303, you have the potential for an authenticated attacker to
bypass security restrictions, caused by an error when validating user
credentials. This could allow a user to gain unauthorized administrative
access to an application and potentially gain access to confidential and
critical customer data.
For more information please refer to Flash:
http://www-01.ibm.com/support/docview.wss?uid=swg21609067
CVSS:
CVSS Base Score: 6.0 CVSS Temporal Score: See
http://xforce.iss.net/xforce/xfdb/77959 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:S/C:P/I:P/A:P)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix:
Apply a Fix Pack or PTF containing this APAR PM71296, as noted below:
For IBM WebSphere Application Server :
For V8.5: o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted
to be available 12 November 2012).
For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later.
For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later.
Workaround(s): None
Mitigation(s): none
CVE ID: CVE-2012-3330 (PM71319)
DESCRIPTION: WebSphere Application Server and WebSphere Virtual Enterprise are
vulnerable to a denial of service, caused by an error in the proxy server
component. By sending a specially-crafted request, a remote attacker could
exploit this vulnerability to cause the proxy to be marked as down and deny
access to applications.
CVSS:
CVSS Base Score: 5.0 CVSS Temporal Score: See
http://xforce.iss.net/xforce/xfdb/78047 for the current score CVSS
Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
AFFECTED PLATFORMS: The following IBM WebSphere Application Server for
distributed operating systems, IBM i operating systems, and z/OS operating
system Versions are affected: Version 8.5 Version 8 Version 7
REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each
named product as soon as practical
Fix:
Apply a Fix Pack or PTF containing this APAR PM71319, as noted below:
For IBM WebSphere Application Server :
For V8.5: o Install Fix Pack 1 (8.5.0.1), or later.
For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted
to be available 12 November 2012).
For V7.0 through 7.0.0.25: o Install Fix Pack 27 (7.0.0.27), or later
(targeted to be available 21 January 2013).
Workaround(s): None
Mitigation(s): none
REFERENCES: Complete CVSS Guide http://www.first.org/cvss/cvss-guide.html
On-line Calculator V2 http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2
CHANGE HISTORY: 29 October 2012: Original copy published
*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Cross reference information Segment Product Component Platform Version Edition
Application Servers IBM HTTP Server Application Servers WebSphere Virtual
Enterprise
Copyright and trademark information
IBM, the IBM logo and ibm.com are trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and
service names might be trademarks of IBM or other companies. A current list of
IBM trademarks is available on the Web at "Copyright and trademark
information" at www.ibm.com/legal/copytrade.shtml.
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQIVAwUBUKRC7O4yVqjM2NGpAQJiDA//by23skYvrtZz9P3cdFdD8xdqsJ2NnMRp
VlhWgdMxP6+8PH0KvHEGNUiZ7nplqcBwUAnYYpvV00OTArsDy/Ps3+1tB9JeSa00
2BMoDQghPK9JRBhbKd5soPUCjLRsuNK9kTXXLsLetFI1MBAcgp3Ne1ndDROfWJNa
x5S4bqYNRj2No66MRaEsorKrilzzqd/ZO/++6BlqE4r4Z06aon7BuLyGj+kTzyjo
aBAnPN+N1NdC0ObNGSIXkLBWFmSyZ3zciOrKlEufALe3j/TnP/WAiKW0gipzqjq4
0oCoy4BiaTXhcgfi+BwZ2OzgFNhsyS8k9wYujVMeI3RyFCrICjwIgMmq+kVQ2Uck
0ncp/tLEq2OLRF+9uyIkOnH5vpFre8IhHqncKJDC3Sp05xUU229JmDxToEFVgWpV
3PenXqH9j6ooLH5fqU2szam3hDWmVWJqVWRn1ICALgMPKBL1QOWXweQyxzxtln+1
WJQz2DYVrXYOcvpZEWVeGcl2519W7V9DhughX88tTl2bYi1iteSLDppigsAI7NjB
24OIZX1ByFGHasAmlu7oDiAnEKU2V5sz/Q4xHaWkXdk8YDdVA8/mKJrSZhZRO22k
szqinhbigb3+P35C8yBn9Ftt94+qctJ8ZfMMY4eVUQnr1eKHfzAJEKJGFJAOMtyp
qJNdh54goAc=
=qRFY
-----END PGP SIGNATURE-----
|