-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3575
                           yaws security update
                              19 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           yaws
Publisher:         Debian
Operating System:  Debian GNU/Linux 10
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-24916 CVE-2020-24379 

Reference:         ESB-2020.3445
                   ESB-2020.3322

Original Bulletin: 
   http://www.debian.org/security/2020/dsa-4773

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4773-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
October 16, 2020                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : yaws
CVE ID         : CVE-2020-24379 CVE-2020-24916

Two vulnerabilities were discovered in yaws, a high performance HTTP 1.1
webserver written in Erlang.

CVE-2020-24379

    The WebDAV implementation is prone to a XML External Entity (XXE)
    injection vulnerability.

CVE-2020-24916

    The CGI implementation does not properly sanitize CGI requests
    allowing a remote attacker to execute arbitrary shell commands via
    specially crafted CGI executable names.

For the stable distribution (buster), these problems have been fixed in
version 2.0.6+dfsg-1+deb10u1.

We recommend that you upgrade your yaws packages.

For the detailed security status of yaws please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/yaws

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=svY8
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBX4zkXONLKJtyKPYoAQjC+w//REYxJx0t7hb1Btt2M3QdeIHVkG/GWtLD
uwFIBXXU4r83yHWXcjqJETahBVPfo9ojf13YMvN6m+0F7CXcLeYwSyUxQb04e2SV
+NB4NGKEeB5+rFVGTWGZrQrn/ZTQaYKlcd1QDMqgS4lC2xJ0jSiYXEmzA8KzGCLm
NERzc6Bjp2uwmXMUcYNNdlidZXvj8lZ83L1vNzKiIiCSuDRqN9HtKzhB1Yh9sYv2
IL49Ga37cdpxG70pYML7AfuN/S/vgkqQlJMfDWRcDgSnuLzkbHkVylpjDkxEUKdg
FzJoVGvUYSM6l5KvREfRT/KB4M3rVrI4OH8cjMMseenrV5aQHCQ08xvHxOLYQnNV
ln/tPlYAgltJpZKNMEuSqlJOZnSqbhMniEJaIDXvM96B0dY3PGtg61vsP6AlSFde
T/tbf8SYG6hytvBFWDluWNgmeva57yb4loOmWtp9tzjjNY4dvdncXRn5JtAkuvhI
1sXQk5Bz29jD5xnaDica1Idq6sIdylUepUoyVUpVjRRZqZoVunEllSWlT37W2yF2
FHiPu8R9F1eQ6c1UUa7qHpXpeFAdgZOtLALRbXHWTywaf2CrhZsubKMBiY8PkED3
/1fBspwKGTpuDIqg71pFeY6BBvBwNICbTNucOHZfGGZvBKb1kDXrrQkQid0vytsZ
5Ax7e1gNfc0=
=o4O3
-----END PGP SIGNATURE-----