-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2015.1258.2
                          zeromq3 security update
                               10 June 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           zeromq3
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Reduced Security -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-9721  

Original Bulletin: 
   http://www.debian.org/security/2015/dsa-3255

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running zeromq3 check for an updated version of the software for 
         their operating system.

Revision History:  June 10 2015: Added CVE
                   May  11 2015: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3255-1                   security@debian.org
http://www.debian.org/security/                        Alessandro Ghedini
May 10, 2015                           http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : zeromq3
CVE ID         : none assigned yet
Debian Bug     : 784366

It was discovered that libzmq, a lightweight messaging kernel, is
susceptible to a protocol downgrade attack on sockets using the ZMTP v3
protocol. This could allow remote attackers to bypass ZMTP v3 security
mechanisms by sending ZMTP v2 or earlier headers.

For the stable distribution (jessie), this problem has been fixed in
version 4.0.5+dfsg-2+deb8u1.

For the testing distribution (stretch), this problem has been fixed in
version 4.0.5+dfsg-3.

For the unstable distribution (sid), this problem has been fixed in
version 4.0.5+dfsg-3.

We recommend that you upgrade your zeromq3 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJVTxleAAoJEK+lG9bN5XPLQMIP/R3AZnKuvsrQNJGPkgL6gYLw
bfmjaCEvpptIa91Dmi4jaaQMwYU5YXlWsklqo5UlYq+HtsougMVGVcRFV/5SswMI
KvhzFmLnjkk3gt21eOvHE4lpgEEdVGg0qLawoATA3I3zSTU3N/tr9HDFrJnQcRDW
s/JWbQsNGdVkUp5IRpQOWn4IwEHZUi8r0b45mTl/JK2Z1sb6VoOoyjsQcdr1FY73
EfY2gmoTZRVhTUKidL+mDKzx7YVfPu6NxuZ3ea0RKoO2sZCppo99CTKI2JPGWYN0
4LftQStGGZqwo71Mr9DzIkWFxANheXnqojD4wQqMBev3DYya3S7taN398W8m9ZU2
TlRbY9CANAOey2Eta1f2GKkBZMPqFbUB/V4ZSEEipNZAzd/0uPnEnekpi30ty4AP
ce8P9Rar2H7VdZgmFcJ2X6N9B9pxIug6BPcXVBcoHLQLJDbPRnVT4+9HwH2ZRKVB
ZNLoVHRGitd4/zKDQ75lB4FcohOSLoPhWnuxgYRvf5voTTyrgUstZCAF0vTKvF01
iPe8womxBSDwGKB3Fd6tc/DlmB0zTR6Yq83s0ANXiLc/ibUO+U9SbPGRsm55081Y
yd9R9vwytaNnf9WUgb7ZYzSGBGAmC1R15k4qSf/7nhFheDKIRG7Su2qp8nyR4a5H
A3NpsBbmQjEfC9L+t6cj
=9CDj
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Vaci
-----END PGP SIGNATURE-----