-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3314
  Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM
  Platform Cluster Manager Standard Edition, IBM Platform Cluster Manager
     Advanced Edition, Platform HPC, and Spectrum Cluster Foundation.
                             2 September 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Spectrum Cluster Foundation
Publisher:         IBM
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account            
                   Modify Arbitrary Files          -- Remote/Unauthenticated      
                   Increased Privileges            -- Existing Account            
                   Denial of Service               -- Remote/Unauthenticated      
                   Access Confidential Data        -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-11775 CVE-2019-11772 CVE-2019-11771
                   CVE-2019-7317 CVE-2019-4473 CVE-2019-2816
                   CVE-2019-2786 CVE-2019-2769 CVE-2019-2766
                   CVE-2019-2762  

Reference:         ASB-2019.0212
                   ESB-2019.3311
                   ESB-2019.3246
                   ESB-2019.3239
                   ESB-2019.3238
                   ESB-2019.3237
                   ESB-2019.3220
                   ESB-2019.3135
                   ESB-2019.3039
                   ESB-2019.3132.2

Original Bulletin: 
   https://www.ibm.com/support/pages/security-bulletin-multiple-vulnerabilities-ibm-java-sdk-affect-ibm-platform-cluster-manager-standard-edition-ibm-platform-cluster-manager-advanced-edition-platform-hpc-and-spectrum-cluster-foundation-1

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Platform
Cluster Manager Standard Edition, IBM Platform Cluster Manager Advanced
Edition, Platform HPC, and Spectrum Cluster Foundation.

Document Information
More support for: 
IBM Spectrum Cluster Foundation

Software version: 
All Versions

Operating system(s): 
Platform Independent

Reference #: 
966935

Security Bulletin


Summary

There are multiple vulnerabilities in IBM(R)Runtime Environment Java(TM)Version                                                                                                                                                                   7
used by IBM Platform Cluster Manager Standard Edition, IBM Platform Cluster
Manager Advanced Edition, Platform HPC, and Spectrum Cluster Foundation. IBM
Platform Cluster Manager Standard Edition, IBM Platform Cluster Manager
Advanced Edition, Platform HPC, and Spectrum Cluster Foundation have addressed
the applicable CVEs.

Vulnerability Details

CVEID: CVE-2019-7317
DESCRIPTION: libpng is vulnerable to a denial of service, caused by a
use-after-free in png_image_free in png.c. By persuading a victim to open a
specially-crafted file, a remote attacker could exploit this vulnerability to
cause a denial of service.
CVSS Base Score: 3.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
156548 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2769
DESCRIPTION: An unspecified vulnerability related to the Java SE Utilities
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163832 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2762
DESCRIPTION: An unspecified vulnerability related to the Java SE Utilities
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163826 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2816
DESCRIPTION: An unspecified vulnerability related to the Java SE Networking
component could allow an unauthenticated attacker to cause low confidentiality
impact, low integrity impact, and no availability impact.
CVSS Base Score: 4.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163878 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVEID: CVE-2019-2786
DESCRIPTION: An unspecified vulnerability related to the Java SE Security
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base Score: 3.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163849 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N)

CVEID: CVE-2019-2766
DESCRIPTION: An unspecified vulnerability related to the Java SE Networking
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163829 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-11772
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by an out-of-bounds write in the
String.getBytes method. An attacker could exploit this vulnerability to corrupt
memory and write to any 32-bit address or beyond the end of a byte array within
Java code run under a SecurityManager.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163990 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2019-11775
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by an error where the loop versioner fails to
privatize a value that is pulled out of the loop by versioning. An attacker
could exploit this vulnerability to corrupt memory and trigger an
out-of-array-bounds and perform invalid actions.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
164479 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2019-4473
DESCRIPTION: Multiple binaries in IBM SDK, Java Technology Edition on the AIX
platform use insecure absolute RPATHs, which may facilitate code injection and
privilege elevation by local users.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163984 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2019-11771
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the inclusion of unused RPATHS in AIX
builds. An attacker could exploit this vulnerability to inject code and gain
elevated privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163989 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)


Affected Products and Versions

Platform Cluster Manager Version 4.2.0, 4.2.0.1, 4.2.0.2 and 4.2.1
Platform HPC Version 4.2.0 and 4.2.1
Spectrum Cluster Foundation 4.2.2


Remediation/Fixes

+-------------------------------+-----------------------+----+----------------+
|Product                        |VRMF                   |APAR|Remediation/    |
|                               |                       |    |First Fix       |
+-------------------------------+-----------------------+----+----------------+
|Platform Cluster Manager       |4.2.0, 4.2.0.1,        |None|See fix below   |
|Standard Edition               |4.2.0.2, 4.2.1         |    |                |
+-------------------------------+-----------------------+----+----------------+
|Platform Cluster Manager       |4.2.0, 4.2.0.1,        |None|See fix below   |
|Advanced Edition               |4.2.0.2, 4.2.1         |    |                |
+-------------------------------+-----------------------+----+----------------+
|Platform HPC                   |4.2.0, 4.2.1           |None|See fix below   |
+-------------------------------+-----------------------+----+----------------+
|Spectrum Cluster Foundation    |4.2.2                  |None|See fix below   |
+-------------------------------+-----------------------+----+----------------+


Platform Cluster Manager 4.2.x & Platform HPC 4.2.x & Spectrum Cluster
Foundation 4.2.2

1. Download IBM JRE 7.0 x86_64 from: http://www.ibm.com/support/fixcentral by
keyword 'Runtimes for Java Technology'. (For POWER platform, you need to
download ppc64 version JRE tar package. The following steps use x86_64 as an
example.)
2. Copy the tar package into the management node.  If high availability is
enabled, copy the JRE tar package to standby management node, as well.
3. If high availability is enabled, shutdown standby management node to avoid
triggering high availability.
4. On the management node, stop GUI and PERF services.
    # pcmadmin service stop --group ALL
5. On management node, extract new JRE files and replace some old folders with
new ones.
    # chmod +x ibm-java-x86_64-jre-7.0-10.50.bin
    # ./ibm-java-x86_64-jre-7.0-10.50.bin
    # mv /opt/pcm/jre/bin /opt/pcm/jre/bin-old
    # mv /opt/pcm/jre/lib /opt/pcm/jre/lib-old
    # mv /opt/pcm/jre/plugin /opt/pcm/jre/plugin-old
    # cp -r ibm-java-x86_64-70/jre/bin /opt/pcm/jre/
    # cp -r ibm-java-x86_64-70/jre/lib /opt/pcm/jre/
    # cp -r ibm-java-x86_64-70/jre/plugin /opt/pcm/jre/
    # mv /opt/pcm/web-portal/jre/linux-x86_64/bin /opt/pcm/web-portal/jre/
linux-x86_64/bin-old
    # mv /opt/pcm/web-portal/jre/linux-x86_64/lib /opt/pcm/web-portal/jre/
linux-x86_64/lib-old
    # mv /opt/pcm/web-portal/jre/linux-x86_64/plugin /opt/pcm/web-portal/jre/
linux-x86_64/plugin-old
    # cp -r ibm-java-x86_64-70/jre/bin /opt/pcm/web-portal/jre/linux-x86_64/
    # cp -r ibm-java-x86_64-70/jre/lib /opt/pcm/web-portal/jre/linux-x86_64/
    # cp -r ibm-java-x86_64-70/jre/plugin /opt/pcm/web-portal/jre/linux-x86_64/
6. On management node, start GUI and PERF services.
    # pcmadmin service start --group ALL
7. If high availability is enabled, start up standby management node, and
replace bin, lib, plugin folders under /opt/pcm/web-portal/jre/linux-x86_64, on
standby management node.


Workarounds and Mitigations

None.


Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References

Complete CVSS v3 Guide
On-line Calculator v3

Off

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

Aug 8, 2019: Original version

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Security Bulletin


Summary

There are multiple vulnerabilities in IBM(R)Runtime Environment Java(TM)Version                                                                                                                                                                   7
used by IBM Platform Cluster Manager Standard Edition, IBM Platform Cluster
Manager Advanced Edition, Platform HPC, and Spectrum Cluster Foundation. IBM
Platform Cluster Manager Standard Edition, IBM Platform Cluster Manager
Advanced Edition, Platform HPC, and Spectrum Cluster Foundation have addressed
the applicable CVEs.

Vulnerability Details

CVEID: CVE-2019-7317
DESCRIPTION: libpng is vulnerable to a denial of service, caused by a
use-after-free in png_image_free in png.c. By persuading a victim to open a
specially-crafted file, a remote attacker could exploit this vulnerability to
cause a denial of service.
CVSS Base Score: 3.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
156548 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2769
DESCRIPTION: An unspecified vulnerability related to the Java SE Utilities
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163832 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2762
DESCRIPTION: An unspecified vulnerability related to the Java SE Utilities
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163826 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2816
DESCRIPTION: An unspecified vulnerability related to the Java SE Networking
component could allow an unauthenticated attacker to cause low confidentiality
impact, low integrity impact, and no availability impact.
CVSS Base Score: 4.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163878 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVEID: CVE-2019-2786
DESCRIPTION: An unspecified vulnerability related to the Java SE Security
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base Score: 3.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163849 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N)

CVEID: CVE-2019-2766
DESCRIPTION: An unspecified vulnerability related to the Java SE Networking
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163829 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-11772
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by an out-of-bounds write in the
String.getBytes method. An attacker could exploit this vulnerability to corrupt
memory and write to any 32-bit address or beyond the end of a byte array within
Java code run under a SecurityManager.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163990 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2019-11775
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by an error where the loop versioner fails to
privatize a value that is pulled out of the loop by versioning. An attacker
could exploit this vulnerability to corrupt memory and trigger an
out-of-array-bounds and perform invalid actions.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
164479 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2019-4473
DESCRIPTION: Multiple binaries in IBM SDK, Java Technology Edition on the AIX
platform use insecure absolute RPATHs, which may facilitate code injection and
privilege elevation by local users.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163984 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2019-11771
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the inclusion of unused RPATHS in AIX
builds. An attacker could exploit this vulnerability to inject code and gain
elevated privileges on the system.
CVSS Base Score: 8.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
163989 for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)


Affected Products and Versions

Platform Cluster Manager Version 4.2.0, 4.2.0.1, 4.2.0.2 and 4.2.1
Platform HPC Version 4.2.0 and 4.2.1
Spectrum Cluster Foundation 4.2.2


Remediation/Fixes

+-------------------------------+-----------------------+----+----------------+
|Product                        |VRMF                   |APAR|Remediation/    |
|                               |                       |    |First Fix       |
+-------------------------------+-----------------------+----+----------------+
|Platform Cluster Manager       |4.2.0, 4.2.0.1,        |None|See fix below   |
|Standard Edition               |4.2.0.2, 4.2.1         |    |                |
+-------------------------------+-----------------------+----+----------------+
|Platform Cluster Manager       |4.2.0, 4.2.0.1,        |None|See fix below   |
|Advanced Edition               |4.2.0.2, 4.2.1         |    |                |
+-------------------------------+-----------------------+----+----------------+
|Platform HPC                   |4.2.0, 4.2.1           |None|See fix below   |
+-------------------------------+-----------------------+----+----------------+
|Spectrum Cluster Foundation    |4.2.2                  |None|See fix below   |
+-------------------------------+-----------------------+----+----------------+


Platform Cluster Manager 4.2.x & Platform HPC 4.2.x & Spectrum Cluster
Foundation 4.2.2

1. Download IBM JRE 7.0 x86_64 from: http://www.ibm.com/support/fixcentral by
keyword 'Runtimes for Java Technology'. (For POWER platform, you need to
download ppc64 version JRE tar package. The following steps use x86_64 as an
example.)
2. Copy the tar package into the management node.  If high availability is
enabled, copy the JRE tar package to standby management node, as well.
3. If high availability is enabled, shutdown standby management node to avoid
triggering high availability.
4. On the management node, stop GUI and PERF services.
    # pcmadmin service stop --group ALL
5. On management node, extract new JRE files and replace some old folders with
new ones.
    # chmod +x ibm-java-x86_64-jre-7.0-10.50.bin
    # ./ibm-java-x86_64-jre-7.0-10.50.bin
    # mv /opt/pcm/jre/bin /opt/pcm/jre/bin-old
    # mv /opt/pcm/jre/lib /opt/pcm/jre/lib-old
    # mv /opt/pcm/jre/plugin /opt/pcm/jre/plugin-old
    # cp -r ibm-java-x86_64-70/jre/bin /opt/pcm/jre/
    # cp -r ibm-java-x86_64-70/jre/lib /opt/pcm/jre/
    # cp -r ibm-java-x86_64-70/jre/plugin /opt/pcm/jre/
    # mv /opt/pcm/web-portal/jre/linux-x86_64/bin /opt/pcm/web-portal/jre/
linux-x86_64/bin-old
    # mv /opt/pcm/web-portal/jre/linux-x86_64/lib /opt/pcm/web-portal/jre/
linux-x86_64/lib-old
    # mv /opt/pcm/web-portal/jre/linux-x86_64/plugin /opt/pcm/web-portal/jre/
linux-x86_64/plugin-old
    # cp -r ibm-java-x86_64-70/jre/bin /opt/pcm/web-portal/jre/linux-x86_64/
    # cp -r ibm-java-x86_64-70/jre/lib /opt/pcm/web-portal/jre/linux-x86_64/
    # cp -r ibm-java-x86_64-70/jre/plugin /opt/pcm/web-portal/jre/linux-x86_64/
6. On management node, start GUI and PERF services.
    # pcmadmin service start --group ALL
7. If high availability is enabled, start up standby management node, and
replace bin, lib, plugin folders under /opt/pcm/web-portal/jre/linux-x86_64, on
standby management node.


Workarounds and Mitigations

None.


Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References

Complete CVSS v3 Guide
On-line Calculator v3

Off

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

Aug 8, 2019: Original version

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=msQp
-----END PGP SIGNATURE-----