ESB-2019.1256 - [RedHat] httpd24: Multiple vulnerabilities 2019-04-12

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1256
   Important: httpd24-httpd and httpd24-mod_auth_mellon security update
                               12 April 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           httpd24-httpd
                   httpd24-mod_auth_mellon
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 6
                   Red Hat Enterprise Linux WS/Desktop 6
                   Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
Impact/Access:     Root Compromise     -- Existing Account      
                   Unauthorised Access -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-3878 CVE-2019-0211 

Reference:         ESB-2019.1162
                   ESB-2019.1156
                   ESB-2019.1049
                   ESB-2019.0965.2

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2019:0746

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: httpd24-httpd and httpd24-mod_auth_mellon security update
Advisory ID:       RHSA-2019:0746-01
Product:           Red Hat Software Collections
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:0746
Issue date:        2019-04-11
CVE Names:         CVE-2019-0211 CVE-2019-3878 
=====================================================================

1. Summary:

An update for httpd24-httpd and httpd24-mod_auth_mellon is now available
for Red Hat Software Collections.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) - noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64

3. Description:

The Apache HTTP Server is a powerful, efficient, and extensible web server.
The httpd24 packages provide a recent stable release of version 2.4 of the
Apache HTTP Server, along with the mod_auth_kerb module.

Security Fix(es):

* httpd: privilege escalation from modules scripts (CVE-2019-0211)

* mod_auth_mellon: authentication bypass in ECP flow (CVE-2019-3878)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, the httpd daemon will be restarted
automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1691126 - CVE-2019-3878 mod_auth_mellon: authentication bypass in ECP flow
1694980 - CVE-2019-0211 httpd: privilege escalation from modules scripts

6. Package List:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):

Source:
httpd24-httpd-2.4.34-7.el6.1.src.rpm

noarch:
httpd24-httpd-manual-2.4.34-7.el6.1.noarch.rpm

x86_64:
httpd24-httpd-2.4.34-7.el6.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-7.el6.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-7.el6.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-7.el6.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-7.el6.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-7.el6.1.x86_64.rpm
httpd24-mod_session-2.4.34-7.el6.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-7.el6.1.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):

Source:
httpd24-httpd-2.4.34-7.el6.1.src.rpm

noarch:
httpd24-httpd-manual-2.4.34-7.el6.1.noarch.rpm

x86_64:
httpd24-httpd-2.4.34-7.el6.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-7.el6.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-7.el6.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-7.el6.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-7.el6.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-7.el6.1.x86_64.rpm
httpd24-mod_session-2.4.34-7.el6.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-7.el6.1.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
httpd24-httpd-2.4.34-7.el7.1.src.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.src.rpm

aarch64:
httpd24-httpd-2.4.34-7.el7.1.aarch64.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.aarch64.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.aarch64.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.aarch64.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.aarch64.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.aarch64.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.aarch64.rpm
httpd24-mod_md-2.4.34-7.el7.1.aarch64.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.aarch64.rpm
httpd24-mod_session-2.4.34-7.el7.1.aarch64.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.aarch64.rpm

noarch:
httpd24-httpd-manual-2.4.34-7.el7.1.noarch.rpm

ppc64le:
httpd24-httpd-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.ppc64le.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.ppc64le.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_md-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_session-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.ppc64le.rpm

s390x:
httpd24-httpd-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.s390x.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.s390x.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_md-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_session-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.s390x.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
httpd24-httpd-2.4.34-7.el7.1.src.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.src.rpm

aarch64:
httpd24-httpd-2.4.34-7.el7.1.aarch64.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.aarch64.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.aarch64.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.aarch64.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.aarch64.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.aarch64.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.aarch64.rpm
httpd24-mod_md-2.4.34-7.el7.1.aarch64.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.aarch64.rpm
httpd24-mod_session-2.4.34-7.el7.1.aarch64.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.aarch64.rpm

noarch:
httpd24-httpd-manual-2.4.34-7.el7.1.noarch.rpm

ppc64le:
httpd24-httpd-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.ppc64le.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.ppc64le.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_md-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_session-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.ppc64le.rpm

s390x:
httpd24-httpd-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.s390x.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.s390x.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_md-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_session-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.s390x.rpm

x86_64:
httpd24-httpd-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.x86_64.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_md-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_session-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4):

Source:
httpd24-httpd-2.4.34-7.el7.1.src.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.src.rpm

noarch:
httpd24-httpd-manual-2.4.34-7.el7.1.noarch.rpm

ppc64le:
httpd24-httpd-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.ppc64le.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.ppc64le.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_md-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_session-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.ppc64le.rpm

s390x:
httpd24-httpd-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.s390x.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.s390x.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_md-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_session-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.s390x.rpm

x86_64:
httpd24-httpd-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.x86_64.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_md-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_session-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):

Source:
httpd24-httpd-2.4.34-7.el7.1.src.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.src.rpm

noarch:
httpd24-httpd-manual-2.4.34-7.el7.1.noarch.rpm

ppc64le:
httpd24-httpd-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.ppc64le.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.ppc64le.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_md-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_session-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.ppc64le.rpm

s390x:
httpd24-httpd-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.s390x.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.s390x.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_md-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_session-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.s390x.rpm

x86_64:
httpd24-httpd-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.x86_64.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_md-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_session-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):

Source:
httpd24-httpd-2.4.34-7.el7.1.src.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.src.rpm

noarch:
httpd24-httpd-manual-2.4.34-7.el7.1.noarch.rpm

ppc64le:
httpd24-httpd-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.ppc64le.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.ppc64le.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.ppc64le.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_md-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_session-2.4.34-7.el7.1.ppc64le.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.ppc64le.rpm

s390x:
httpd24-httpd-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.s390x.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.s390x.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.s390x.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_md-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_session-2.4.34-7.el7.1.s390x.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.s390x.rpm

x86_64:
httpd24-httpd-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.x86_64.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_md-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_session-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):

Source:
httpd24-httpd-2.4.34-7.el7.1.src.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.src.rpm

noarch:
httpd24-httpd-manual-2.4.34-7.el7.1.noarch.rpm

x86_64:
httpd24-httpd-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-7.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_auth_mellon-0.13.1-2.el7.1.x86_64.rpm
httpd24-mod_auth_mellon-debuginfo-0.13.1-2.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_md-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_session-2.4.34-7.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-7.el7.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-0211
https://access.redhat.com/security/cve/CVE-2019-3878
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBXK8sC9zjgjWX9erEAQi7lw//Xx6LqmrUSO5A3ZoWhQZQTfISA9IiLpYy
z8CihSfJERVj1lyjINoCQ7vmFyZyPKaBBy+xJhN60WRoYb0ymCTQXQ+eP9vmYXyz
cfTs5oYeZzuL7d9FZmv6msUq8wOVm6q6Yt7pGBH8ZkzezCiLj2Ald36r5bH/ExxH
zh1HB7U45yEqDmtcg8ezVsJSu1jXX1E6uhrINcBCRvVgfWw0xFthhiY7C5doOxmX
/QEGFhRicUsFO/PX063z2IdoYojJeozBKTPKecMOEMDS1A46W7f6v9Sm+LVZXN8z
a40xkpy6PudREBJyWfd+aDKApJUTN+cGEwnC5N7T8K/G03mW08rGUFOsBKu1zdtw
TxrmgbYqHvkBBkH0A7zLhpizRMwWaTi+UQsQO90OUro2S19GNdLrDhK6oP1gy/0q
couwBERVBjfzyqAVa2mKpNiUoW4BJT2C4ltJN/l2S2xyc3D5Stni6nXJtIzLcjqJ
QnEpocjDAX1I5Uq4p6VttPMB2htJ2L3KDS1igoi7NBVNYijEKiroVClmFbj+sjBX
LNuMBYbNe+G0mK6geBzvxnh0tuSdlnbWJckWyO6+UEucs2n9cT40rxCsPMTA5ggr
LQXrhvzIQkNVvbc2JMg6j5kboymYyUDkm6RV9itBe3NmJNFKaKCHdmuKJZVbeQKm
jlbXNl9kOkM=
=iRSz
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=0ohJ
-----END PGP SIGNATURE-----

« Back to bulletins