ESB-2017.3210 - [Debian] otrs2: Multiple vulnerabilities 2017-12-18

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.3210
                           otrs2 security update
                             18 December 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           otrs2
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
                   Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Access Privileged Data          -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-16921 CVE-2017-16854 

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-4066

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running otrs2 check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4066-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 17, 2017                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : otrs2
CVE ID         : CVE-2017-16854 CVE-2017-16921

Two vulnerabilities were discovered in the Open Ticket Request System
which could result in information disclosure  or the execution of arbitrary
shell commands by logged-in agents.
		       
For the oldstable distribution (jessie), these problems have been fixed
in version 3.3.18-1+deb8u3.

For the stable distribution (stretch), these problems have been fixed in
version 5.0.16-1+deb9u4.

We recommend that you upgrade your otrs2 packages.

For the detailed security status of otrs2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/otrs2

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=BpBT
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWjb+V4x+lLeg9Ub1AQhPXg/+MEPVj4CpBLdpJxwTU0ZfVdmNNojTiEAp
QtEDVJhS2AFy1OtkQ9DqiTq8jQMUhW3PGxEOSEEW7SiChbF9W1IqwiLjGVHS1exR
shNe2nGyQyMOu9iVEoD+/syh0TCfonl+3oUaHHkpqNrmA0RhE2Dg+ZRRytHoy773
EZjkhISHQ4n3jYuu/sF/ewB54yAjindYMo9/UGBx3WFlF5BY3/So8YEo+kKHFA17
XZiJvyw4MpVnmOh3KWdeHLuJL0CBdo/8ff+DTosxJARUfUcpCJZ/ANja3gn4h9sa
f//I7cpJ5+U8LQ8RmHNwRPHRcJuBXaHsxoR8kTaOVFVCc3H4RJRngwXtr6Ka9y04
1FAW4xFJNWy5UJTmmuR9YAue1C34A/dF1+xVONIok/59bUX8gDHcBaUJu39QyjqO
Y31iHGz+5moMA7TG545Z+MoieA1V7FPNvJu1egFu1u9nBcik1hCG6Mxceb3JZ9yB
YlcRmI/1DAE0Es12e/5slgN4ibD5k46hhvdPHE8ocZrbARRdjCCxM3p6UKHnq4GP
OlxwmBNN6npaF/vW8k90tg00tcsL8AkeLtFVYhJkyFaC2vPwH4Uj+Bzkl+NLuMju
3EIYGubROCBLJ4Zzqn3fMSUkxwXr+CLQsybVumMvri+S9rfspIWvNL3Gr+P9fI+8
EIJCKHSkaTA=
=Et2v
-----END PGP SIGNATURE-----

« Back to bulletins