Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4493 xmlrpc-epi security update 27 November 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: xmlrpc-epi Publisher: Debian Operating System: Debian GNU/Linux 8 Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2016-6296 Reference: ESB-2016.2924 ESB-2016.1820 Original Bulletin: https://lists.debian.org/debian-lts-announce/2019/11/msg00029.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : xmlrpc-epi Version : 0.54.2-1.1+deb8u1 CVE ID : CVE-2016-6296 An issue in xmlrpc-epi, an XML-RPC request serialisation/deserialisation library, has been found. An integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi could be used for a heap based buffer overflow and possibly execution of arbitrary code. For Debian 8 "Jessie", this problem has been fixed in version 0.54.2-1.1+deb8u1. We recommend that you upgrade your xmlrpc-epi packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAl3dmjhfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7 WEfAqw/+MKbqm7p6xUne9lOfBGzEn9ZoL1LA9f59JXIDOCzyTP53apK+csWbbK7C JPsjAfHOt6Ew/+IN7jVtQVe96cPH4HZsqexhenJ4kEtZTl0rEic04WULpYPqhCYX IYPCvux5+zcvvXgreaapiKH2VOFjjN5qwkNSrqD4qh0jYbE77YZ97P5jN9ruEf78 siKkwT0ggLw/NqZBZRl5CyLOqrafUHCSZ3MLL+M7rI14cEdftz9oxfWlphoVMqdB uMRXIQ3a2ylI5nhKOeET2EOAYWQm38b8dl53ZGsxnUKdAnPSPyPfJZ8wvBGPNLw8 XaKBoNGzR83NTvzvir7CzdQiIsQYPLT2vAXGELVUUICQwjE/CpftmzAxn8d6Uv/Z IlynCJk9K8aWVkSItrPcEZRaFm1G36uj9pkatY40e/CLFDvb1FPEzjgHJrEoeo05 95/qXti6F2flE09G1O4b3mNtoKL5zOi9tTSLm5yBpuCaYXLmTQpWuSSJXWMRuX6M 734WXe2N8y7yeX8ZU96v6NMWeOhwiXqHuxRwM3IhzXJDK7FQdfb1ppxK8dO6INca sY39rVNsS1mUNLypfX/rRo2UIZM6xKxV+6YixNZO86PAW2Ir0IrHmv6socHjsJ5A gDVTZe4d5jdpY2AC/kIt3rI3N1vDob3DsSUk5Pe0XPs/RnAcK9g= =VhX7 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXd4GK2aOgq3Tt24GAQg/uw/7BjFpIWcBwlfnDvFNZd+xTFFjuRaOi+aF jQ5ShYuaMw8zO3+pNr2uCsbv9jVBy7ZPiCai8lOggfL07ogotR7lHlW7t+VwTAp5 T9eUbnYXfJEo7jmUxzdaJ6ZvVwLHGFbFKuWfmms8kfhA77hH1N9EgCPLUtKgqnbx OMdNSg2F3FpF1oAA/KmjyPNE+wZ1S1BvnYJS7NOG3OwYuuYntIqiAOESx1vc73+n QybP4xXCFcuxmXNudpF43N6EFmL3EOAC1QzCRT7oLXSjt9Y8GDBtycmEgdEAcSOD yowLK5gF9d2o70mu1MtP8sdz0HiIStq5Dv/yjK9/5jjM05Wyh6j/JiHJr8Kf8WXY vKTlz5wmd+x5oA+QlpUZlZOHcJnhZpu/PrBK/2nsaJ1RzGEJJmfU6hYyI9hKq22A Km7MTgf988Abakr18KwjZAP3OjVOeBsjfG+G0ExPLcuwE0diu4GQh0cBOMJc+z0a Zf2GNWhURmCy/pki+U13Vci1Ln1I6bzqz//EseYRbwQ7jH59nVk6nDJRmKyxkvQW 8MjiaSoOoGIPYhuuljFWJ5D26zu10po5VoZEpoEv+iSpSerBP8V6sQurvj+XqrFd GvZAH8LIuzBAEfg+xoabYTlBj0GNaDMFhuJbB0c5q6zu6qRQeXPXDGc3O/gsVN2V Ok83/pjyX0M= =tgMX -----END PGP SIGNATURE-----