Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.1222 xerces-c security update 17 May 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: xerces-c Publisher: Debian Operating System: Debian GNU/Linux 8 UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2016-2099 Original Bulletin: http://www.debian.org/security/2016/dsa-3579 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running xerces-c check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3579-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso May 16, 2016 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : xerces-c CVE ID : CVE-2016-2099 Debian Bug : 823863 Gustavo Grieco discovered an use-after-free vulnerability in xerces-c, a validating XML parser library for C++, due to not properly handling invalid characters in XML input documents in the DTDScanner. For the stable distribution (jessie), this problem has been fixed in version 3.1.1-5.1+deb8u2. For the testing distribution (stretch), this problem has been fixed in version 3.1.3+debian-2. For the unstable distribution (sid), this problem has been fixed in version 3.1.3+debian-2. We recommend that you upgrade your xerces-c packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJXOW7JAAoJEAVMuPMTQ89Er9cP/iDY5XCVg4IgAwaogj7wgE7m sG6Bz7ZnUqil7Z9PXawCuxbV4kEsJbfRbz/+RntMfAKMidRttMj5wE8pgAkQwpkM ZxeA2hdNwC2n02s7jQNb2wIzNZT8VXUcslQEHIU+9r+zybUl+w8UolEz3quKaBiw pUW3R17ZTY0S7w5BZ34r4DSvRY4zk4+J94fKgsBgYlCX6E/ZCOYlMS61/ubzSHCh I6DLlBBu/cGJsCdfR0YvQuL63xhH+bCAd28IcS3MVQHG1xTu55J1hQ2M+cepzNi0 R7FhrrRmdfh62MKynZ+LXXsSlaP8254zJEdCaJXE8U0/gB2WKOw7mMcgArFBlBQx IytcZPiEHgEVBfRa/EJJnTXXtVoVr0Fv/7aOHRJIw9rAhpTL1b+FcudEWUgSAsaI OOn+nVNlG/BbvfVtFmukXGZ+M5jQI/Y5kRZrCZqYE2MqDRhP+b27t84tYD3TMo++ 0dWYNrjfVAvsBgJlo52+TyrMX4ndD++IE6JHchPe+v6IAQyWX79N8UkmrZxCfKKo KwiuLp+Jlss/+cnP+aJYp0SJlOfAg79rGJ98/97hrHrQSrtPmfvn6/trUr7xONXl MF7Jnanh/LoryxBoYL1vlxIEFhu6Rc/fzG7yAO58kw4fnKi2OwfnkaYsMYxHFE3o rirTluoIjCgkrmMSoAXS =D1tG - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVzpqq36ZAP0PgtI9AQL0WQ//ez7N3iEQ9oXKyunkGUZVSrj9f6WhXJ7W oDUD4wdrsE46VcT/HqhyjsqhBVPZ71Cz8fbt1jXaEX7CAj5jabcH1bzxZMHbcrcq vOmp2bbDSzn97/xnjq/5qcm/sA8hLgis3vjfRPCroRIhNtBSkhsSJIhCiW64Rxhr UsaGoMG8WiNWuMmmwyb3i2ymhQ80W3nJxdQwGSpGNUzL/xWjnPoHVC8YSYcpLyfm bbOz4JT2blynjS8gYyG2tpHxzPYR/MPqKq84SIALnmIF2Pf0VSTPAbhaRBZhfnjb 2fCugRzl9WUwB6zx/K6ryh/ejhIhL1ZY6yKQnOlv5Q6+GXmidctrNr4P5KqK8ugQ IPpno5N6R2RMVoCowa728OXL06PC3Lz559673AAweGSB5L71PFe/giXluyQL9rdX tCoCAGsNNy33nL2GSHLuHTPefWEInVF/Zy25J8WNSuFyAq5tvHOhF1y/F2FitymN jfzYdAtgCUsXK+8vfhpwU8QmslsBBKplNJix62D0vuutZCYSfBEbqZwWJqezskfZ 0r06Ufx0wa7kMy9nW1uEohzeNZbYlcWefz9DHIdUA07E+RY6XM2AZ2BYtt3uDig+ 1UhbmrrkYOgVRM2WHWp8uRi/ZqgMzg9jtY7fxTusmKOLrRkgJbW5uIewI6wlbmEs lMRuyiiPSkM= =I933 -----END PGP SIGNATURE-----