-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4493
                        xmlrpc-epi security update
                             27 November 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           xmlrpc-epi
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Denial of Service               -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-6296  

Reference:         ESB-2016.2924
                   ESB-2016.1820

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2019/11/msg00029.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : xmlrpc-epi
Version        : 0.54.2-1.1+deb8u1
CVE ID         : CVE-2016-6296


An issue in xmlrpc-epi, an XML-RPC request serialisation/deserialisation 
library, has been found.

An integer signedness error in the simplestring_addn function in 
simplestring.c in xmlrpc-epi could be used for a heap based buffer 
overflow and possibly execution of arbitrary code.


For Debian 8 "Jessie", this problem has been fixed in version
0.54.2-1.1+deb8u1.

We recommend that you upgrade your xmlrpc-epi packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=VhX7
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXd4GK2aOgq3Tt24GAQg/uw/7BjFpIWcBwlfnDvFNZd+xTFFjuRaOi+aF
jQ5ShYuaMw8zO3+pNr2uCsbv9jVBy7ZPiCai8lOggfL07ogotR7lHlW7t+VwTAp5
T9eUbnYXfJEo7jmUxzdaJ6ZvVwLHGFbFKuWfmms8kfhA77hH1N9EgCPLUtKgqnbx
OMdNSg2F3FpF1oAA/KmjyPNE+wZ1S1BvnYJS7NOG3OwYuuYntIqiAOESx1vc73+n
QybP4xXCFcuxmXNudpF43N6EFmL3EOAC1QzCRT7oLXSjt9Y8GDBtycmEgdEAcSOD
yowLK5gF9d2o70mu1MtP8sdz0HiIStq5Dv/yjK9/5jjM05Wyh6j/JiHJr8Kf8WXY
vKTlz5wmd+x5oA+QlpUZlZOHcJnhZpu/PrBK/2nsaJ1RzGEJJmfU6hYyI9hKq22A
Km7MTgf988Abakr18KwjZAP3OjVOeBsjfG+G0ExPLcuwE0diu4GQh0cBOMJc+z0a
Zf2GNWhURmCy/pki+U13Vci1Ln1I6bzqz//EseYRbwQ7jH59nVk6nDJRmKyxkvQW
8MjiaSoOoGIPYhuuljFWJ5D26zu10po5VoZEpoEv+iSpSerBP8V6sQurvj+XqrFd
GvZAH8LIuzBAEfg+xoabYTlBj0GNaDMFhuJbB0c5q6zu6qRQeXPXDGc3O/gsVN2V
Ok83/pjyX0M=
=tgMX
-----END PGP SIGNATURE-----