Date: 20 December 2007
References: ESB-2008.0038 ESB-2008.0135 ESB-2008.0296
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2007.1035 -- [UNIX/Linux][RedHat]
Moderate: libexif security update
20 December 2007
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: libexif
Publisher: Red Hat
Operating System: Red Hat Linux 5
Red Hat Linux 4
UNIX variants (UNIX, Linux, OSX)
Impact: Execute Arbitrary Code/Commands
Denial of Service
Access: Remote/Unauthenticated
CVE Names: CVE-2007-6352 CVE-2007-6351
Original Bulletin: https://rhn.redhat.com/errata/RHSA-2007-1166.html
https://rhn.redhat.com/errata/RHSA-2007-1165.html
Comment: Note that there are two Red Hat advisories in this bulletin.
This advisory references vulnerabilities in products which run
on platforms other than Red Hat. It is recommended that
administrators running libexif check for an updated version
of the software for their operating system.
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Moderate: libexif security update
Advisory ID: RHSA-2007:1165-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1165.html
Issue date: 2007-12-19
Updated on: 2007-12-19
Product: Red Hat Enterprise Linux
CVE Names: CVE-2007-6351 CVE-2007-6352
- - ---------------------------------------------------------------------
1. Summary:
Updated libexif packages that fix several security issues are now available
for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
3. Problem description:
The libexif packages contain the Exif library. Exif is an image file format
specification that enables metadata tags to be added to existing JPEG, TIFF
and RIFF files. The Exif library makes it possible to parse an Exif file
and read this metadata.
An infinite recursion flaw was found in the way libexif parses Exif image
tags. If a victim opens a carefully crafted Exif image file, it could cause
the application linked against libexif to crash. (CVE-2007-6351)
An integer overflow flaw was found in the way libexif parses Exif image
tags. If a victim opens a carefully crafted Exif image file, it could cause
the application linked against libexif to execute arbitrary code, or crash.
(CVE-2007-6352)
Users of libexif are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
425551 - CVE-2007-6351 libexif infinite recursion flaw (DoS)
425561 - CVE-2007-6352 libexif integer overflow
6. RPMs required:
Red Hat Enterprise Linux Desktop (v. 5 client):
SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libexif-0.6.13-4.0.2.el5_1.1.src.rpm
405b067a3ff329fd2f73b4edfd767837 libexif-0.6.13-4.0.2.el5_1.1.src.rpm
i386:
5f5e2fdebf5c7aeb88c4d25ce887edf3 libexif-0.6.13-4.0.2.el5_1.1.i386.rpm
2ec8f0b6652c4c55b3923d2e319a6ec1 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.i386.rpm
x86_64:
5f5e2fdebf5c7aeb88c4d25ce887edf3 libexif-0.6.13-4.0.2.el5_1.1.i386.rpm
91d485dd3c59491db18592d70a25a59a libexif-0.6.13-4.0.2.el5_1.1.x86_64.rpm
2ec8f0b6652c4c55b3923d2e319a6ec1 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.i386.rpm
0a1a7b23c17e3dddb66022e1a039cebd libexif-debuginfo-0.6.13-4.0.2.el5_1.1.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libexif-0.6.13-4.0.2.el5_1.1.src.rpm
405b067a3ff329fd2f73b4edfd767837 libexif-0.6.13-4.0.2.el5_1.1.src.rpm
i386:
2ec8f0b6652c4c55b3923d2e319a6ec1 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.i386.rpm
eccd0c4354faa72f1aac98e074c53b4e libexif-devel-0.6.13-4.0.2.el5_1.1.i386.rpm
x86_64:
2ec8f0b6652c4c55b3923d2e319a6ec1 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.i386.rpm
0a1a7b23c17e3dddb66022e1a039cebd libexif-debuginfo-0.6.13-4.0.2.el5_1.1.x86_64.rpm
eccd0c4354faa72f1aac98e074c53b4e libexif-devel-0.6.13-4.0.2.el5_1.1.i386.rpm
a4cd77aa35f9c6e302399e094ca66fef libexif-devel-0.6.13-4.0.2.el5_1.1.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/libexif-0.6.13-4.0.2.el5_1.1.src.rpm
405b067a3ff329fd2f73b4edfd767837 libexif-0.6.13-4.0.2.el5_1.1.src.rpm
i386:
5f5e2fdebf5c7aeb88c4d25ce887edf3 libexif-0.6.13-4.0.2.el5_1.1.i386.rpm
2ec8f0b6652c4c55b3923d2e319a6ec1 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.i386.rpm
eccd0c4354faa72f1aac98e074c53b4e libexif-devel-0.6.13-4.0.2.el5_1.1.i386.rpm
ia64:
d82e96851e21bad167757e92e702904f libexif-0.6.13-4.0.2.el5_1.1.ia64.rpm
30b855e223e1dfd41e8eb7e47bf8944b libexif-debuginfo-0.6.13-4.0.2.el5_1.1.ia64.rpm
5e4041135eab0541826dd5332c2114a3 libexif-devel-0.6.13-4.0.2.el5_1.1.ia64.rpm
ppc:
1045dc0f0638a436e5fb27d46a7ac953 libexif-0.6.13-4.0.2.el5_1.1.ppc.rpm
78b8320d53f0e730eb9a7403e132605a libexif-0.6.13-4.0.2.el5_1.1.ppc64.rpm
2325b01e76dd387150789182f9966f8b libexif-debuginfo-0.6.13-4.0.2.el5_1.1.ppc.rpm
d1d108e272a0db54b3d59731a9c1ce55 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.ppc64.rpm
70db0f13504d616e7cc33f38b4a308ca libexif-devel-0.6.13-4.0.2.el5_1.1.ppc.rpm
5aa61322b25614936b3e0af6dbdd0770 libexif-devel-0.6.13-4.0.2.el5_1.1.ppc64.rpm
s390x:
a4ce630587f200dac5017132df1b32bd libexif-0.6.13-4.0.2.el5_1.1.s390.rpm
e4e24274f53f54eafdab963c6827d26e libexif-0.6.13-4.0.2.el5_1.1.s390x.rpm
63c098ac83e4dde2e57ccefb3220bcd2 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.s390.rpm
93cc0e5e78577be2ce118c329f27ca97 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.s390x.rpm
12a3e54a8e9d55063f504c68b0aee802 libexif-devel-0.6.13-4.0.2.el5_1.1.s390.rpm
2caf7997904ed6242a03c86522bdabfc libexif-devel-0.6.13-4.0.2.el5_1.1.s390x.rpm
x86_64:
5f5e2fdebf5c7aeb88c4d25ce887edf3 libexif-0.6.13-4.0.2.el5_1.1.i386.rpm
91d485dd3c59491db18592d70a25a59a libexif-0.6.13-4.0.2.el5_1.1.x86_64.rpm
2ec8f0b6652c4c55b3923d2e319a6ec1 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.i386.rpm
0a1a7b23c17e3dddb66022e1a039cebd libexif-debuginfo-0.6.13-4.0.2.el5_1.1.x86_64.rpm
eccd0c4354faa72f1aac98e074c53b4e libexif-devel-0.6.13-4.0.2.el5_1.1.i386.rpm
a4cd77aa35f9c6e302399e094ca66fef libexif-devel-0.6.13-4.0.2.el5_1.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6352
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFHaT0wXlSAg2UNWIIRAlwFAKCGcatbp/6XAqgTwndZLv1NUBSUuACglOZq
BG8iZuBm8c/FWC3ZnUErg8o=
=9a9l
- -----END PGP SIGNATURE-----
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Moderate: libexif security update
Advisory ID: RHSA-2007:1166-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1166.html
Issue date: 2007-12-19
Updated on: 2007-12-19
Product: Red Hat Enterprise Linux
CVE Names: CVE-2007-6352
- - ---------------------------------------------------------------------
1. Summary:
Updated libexif packages that fix a security issue are now available for
Red Hat Enterprise Linux 4.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
The libexif packages contain the Exif library. Exif is an image file format
specification that enables metadata tags to be added to existing JPEG, TIFF
and RIFF files. The Exif library makes it possible to parse an Exif file
and read this metadata.
An integer overflow flaw was found in the way libexif parses Exif image
tags. If a victim opens a carefully crafted Exif image file, it could cause
the application linked against libexif to execute arbitrary code, or crash.
(CVE-2007-6352)
Users of libexif are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
425561 - CVE-2007-6352 libexif integer overflow
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/libexif-0.5.12-5.1.0.2.el4_6.1.src.rpm
260e767569adf64cc7bd5359e6ca9059 libexif-0.5.12-5.1.0.2.el4_6.1.src.rpm
i386:
3b38729e0932d0993c2aa8447fd104d6 libexif-0.5.12-5.1.0.2.el4_6.1.i386.rpm
0e92cbf49a54e48aa6a290a9d85a0b0a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.i386.rpm
cba10132a49290056136efe9160dc358 libexif-devel-0.5.12-5.1.0.2.el4_6.1.i386.rpm
ia64:
3b38729e0932d0993c2aa8447fd104d6 libexif-0.5.12-5.1.0.2.el4_6.1.i386.rpm
00528e858aa4853cb43fe95572223fb5 libexif-0.5.12-5.1.0.2.el4_6.1.ia64.rpm
0e92cbf49a54e48aa6a290a9d85a0b0a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.i386.rpm
9ae7aa25051814a3f35300cea755754a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.ia64.rpm
c1cb9d74c7756f3d5519d37d0e7e24fb libexif-devel-0.5.12-5.1.0.2.el4_6.1.ia64.rpm
ppc:
d9c4c1761d584c5ceb693e4d4a25cff2 libexif-0.5.12-5.1.0.2.el4_6.1.ppc.rpm
1488abdeab9cd669eb528d213d2a0fd5 libexif-0.5.12-5.1.0.2.el4_6.1.ppc64.rpm
e2ca79a7acb61d309266dd89a609f22c libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.ppc.rpm
7c46e330c4529c3af69b3073dac1b798 libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.ppc64.rpm
8a2582768cec7f1c138ea2be7233e7a1 libexif-devel-0.5.12-5.1.0.2.el4_6.1.ppc.rpm
s390:
7aef19a3a514ae5b33a401f9b8004d42 libexif-0.5.12-5.1.0.2.el4_6.1.s390.rpm
5e9024c5b814336172d9f160da29a560 libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.s390.rpm
f0539bf3e24ccd7a870d5a62fd763193 libexif-devel-0.5.12-5.1.0.2.el4_6.1.s390.rpm
s390x:
7aef19a3a514ae5b33a401f9b8004d42 libexif-0.5.12-5.1.0.2.el4_6.1.s390.rpm
d66a5dd70c8aa83901eb19152458dc95 libexif-0.5.12-5.1.0.2.el4_6.1.s390x.rpm
5e9024c5b814336172d9f160da29a560 libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.s390.rpm
b1b2906325d8762567c84d559472822b libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.s390x.rpm
55f2289b65e062160f68a3275e7a4ed1 libexif-devel-0.5.12-5.1.0.2.el4_6.1.s390x.rpm
x86_64:
3b38729e0932d0993c2aa8447fd104d6 libexif-0.5.12-5.1.0.2.el4_6.1.i386.rpm
4c3588ded0ada47e1ff348b87b7cc46d libexif-0.5.12-5.1.0.2.el4_6.1.x86_64.rpm
0e92cbf49a54e48aa6a290a9d85a0b0a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.i386.rpm
f40057ce7194e5940a8c9d062d83de30 libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.x86_64.rpm
f9cf7abb7972b3c39258750c63e1b6d6 libexif-devel-0.5.12-5.1.0.2.el4_6.1.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/libexif-0.5.12-5.1.0.2.el4_6.1.src.rpm
260e767569adf64cc7bd5359e6ca9059 libexif-0.5.12-5.1.0.2.el4_6.1.src.rpm
i386:
3b38729e0932d0993c2aa8447fd104d6 libexif-0.5.12-5.1.0.2.el4_6.1.i386.rpm
0e92cbf49a54e48aa6a290a9d85a0b0a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.i386.rpm
cba10132a49290056136efe9160dc358 libexif-devel-0.5.12-5.1.0.2.el4_6.1.i386.rpm
x86_64:
3b38729e0932d0993c2aa8447fd104d6 libexif-0.5.12-5.1.0.2.el4_6.1.i386.rpm
4c3588ded0ada47e1ff348b87b7cc46d libexif-0.5.12-5.1.0.2.el4_6.1.x86_64.rpm
0e92cbf49a54e48aa6a290a9d85a0b0a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.i386.rpm
f40057ce7194e5940a8c9d062d83de30 libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.x86_64.rpm
f9cf7abb7972b3c39258750c63e1b6d6 libexif-devel-0.5.12-5.1.0.2.el4_6.1.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/libexif-0.5.12-5.1.0.2.el4_6.1.src.rpm
260e767569adf64cc7bd5359e6ca9059 libexif-0.5.12-5.1.0.2.el4_6.1.src.rpm
i386:
3b38729e0932d0993c2aa8447fd104d6 libexif-0.5.12-5.1.0.2.el4_6.1.i386.rpm
0e92cbf49a54e48aa6a290a9d85a0b0a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.i386.rpm
cba10132a49290056136efe9160dc358 libexif-devel-0.5.12-5.1.0.2.el4_6.1.i386.rpm
ia64:
3b38729e0932d0993c2aa8447fd104d6 libexif-0.5.12-5.1.0.2.el4_6.1.i386.rpm
00528e858aa4853cb43fe95572223fb5 libexif-0.5.12-5.1.0.2.el4_6.1.ia64.rpm
0e92cbf49a54e48aa6a290a9d85a0b0a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.i386.rpm
9ae7aa25051814a3f35300cea755754a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.ia64.rpm
c1cb9d74c7756f3d5519d37d0e7e24fb libexif-devel-0.5.12-5.1.0.2.el4_6.1.ia64.rpm
x86_64:
3b38729e0932d0993c2aa8447fd104d6 libexif-0.5.12-5.1.0.2.el4_6.1.i386.rpm
4c3588ded0ada47e1ff348b87b7cc46d libexif-0.5.12-5.1.0.2.el4_6.1.x86_64.rpm
0e92cbf49a54e48aa6a290a9d85a0b0a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.i386.rpm
f40057ce7194e5940a8c9d062d83de30 libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.x86_64.rpm
f9cf7abb7972b3c39258750c63e1b6d6 libexif-devel-0.5.12-5.1.0.2.el4_6.1.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/libexif-0.5.12-5.1.0.2.el4_6.1.src.rpm
260e767569adf64cc7bd5359e6ca9059 libexif-0.5.12-5.1.0.2.el4_6.1.src.rpm
i386:
3b38729e0932d0993c2aa8447fd104d6 libexif-0.5.12-5.1.0.2.el4_6.1.i386.rpm
0e92cbf49a54e48aa6a290a9d85a0b0a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.i386.rpm
cba10132a49290056136efe9160dc358 libexif-devel-0.5.12-5.1.0.2.el4_6.1.i386.rpm
ia64:
3b38729e0932d0993c2aa8447fd104d6 libexif-0.5.12-5.1.0.2.el4_6.1.i386.rpm
00528e858aa4853cb43fe95572223fb5 libexif-0.5.12-5.1.0.2.el4_6.1.ia64.rpm
0e92cbf49a54e48aa6a290a9d85a0b0a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.i386.rpm
9ae7aa25051814a3f35300cea755754a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.ia64.rpm
c1cb9d74c7756f3d5519d37d0e7e24fb libexif-devel-0.5.12-5.1.0.2.el4_6.1.ia64.rpm
x86_64:
3b38729e0932d0993c2aa8447fd104d6 libexif-0.5.12-5.1.0.2.el4_6.1.i386.rpm
4c3588ded0ada47e1ff348b87b7cc46d libexif-0.5.12-5.1.0.2.el4_6.1.x86_64.rpm
0e92cbf49a54e48aa6a290a9d85a0b0a libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.i386.rpm
f40057ce7194e5940a8c9d062d83de30 libexif-debuginfo-0.5.12-5.1.0.2.el4_6.1.x86_64.rpm
f9cf7abb7972b3c39258750c63e1b6d6 libexif-devel-0.5.12-5.1.0.2.el4_6.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6352
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFHaT1sXlSAg2UNWIIRAkoUAJ9H7DZ17YMiuo3vUW8qPg5YPZwxngCdEf3b
rhy/OlU2+Xst4QeGj0iMXsw=
=OEhC
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBR2nP9Sh9+71yA2DNAQIMGgP6A2Y1TDuLZaj9b16xs7rS3scY9N9qLeOr
1ReZHKlP558LCYj/tZxG2OirQkfU8yijwS13JtNi7anJ35YW0PYhVNcfqN7xGGLF
sly4e99g6b+Pr15Zy97Zog7Rx2eYJ/V6pd94ysYWaZhdCC4dmOVZ2qI3N8T1T3J0
33G5QcW7W2s=
=XKFn
-----END PGP SIGNATURE-----
|