ESB-2018.0956 - [Debian] irssi: Multiple vulnerabilities 2018-04-03

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.0956
                           irssi security update
                               3 April 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           irssi
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-7054 CVE-2018-7053 CVE-2018-7052
                   CVE-2018-7051 CVE-2018-7050 CVE-2018-5208
                   CVE-2018-5207 CVE-2018-5206 CVE-2018-5205

Reference:         ESB-2018.0857
                   ESB-2018.0667
                   ESB-2018.0121

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4162

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4162-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
April 01, 2018                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : irssi
CVE ID         : CVE-2018-5205 CVE-2018-5206 CVE-2018-5207 CVE-2018-5208 
                 CVE-2018-7050 CVE-2018-7051 CVE-2018-7052 CVE-2018-7053 
                 CVE-2018-7054

Multiple vulnerabilities have been discovered in Irssi, a terminal-based
IRC client which can result in denial of service.

For the stable distribution (stretch), these problems have been fixed in
version 1.0.7-1~deb9u1.

We recommend that you upgrade your irssi packages.

For the detailed security status of irssi please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/irssi

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=RuOm
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=kjbD
-----END PGP SIGNATURE-----

« Back to bulletins