ESB-2018.0943 - [Win][UNIX/Linux][Debian] xerces-c: Multiple vulnerabilities 2018-04-03

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.0943
                         xerces-c security update
                               3 April 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           xerces-c
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-12627  

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/03/msg00032.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running xerces-c check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : xerces-c
Version        : 3.1.1-3+deb7u5
CVE ID         : CVE-2017-12627
Debian Bug     : 894050

Alberto Garcia, Francisco Oca and Suleman Ali of Offensive Research
discovered that the Xerces-C XML parser mishandles certain kinds of
external DTD references, resulting in dereference of a NULL pointer
while processing the path to the DTD. The bug allows for a denial of
service attack in applications that allow DTD processing and do not
prevent external DTD usage, and could conceivably result in remote code
execution.

For Debian 7 "Wheezy", these problems have been fixed in version
3.1.1-3+deb7u5.

We recommend that you upgrade your xerces-c packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=fosM
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=WwHu
-----END PGP SIGNATURE-----

« Back to bulletins