Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.3575 yaws security update 19 October 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: yaws Publisher: Debian Operating System: Debian GNU/Linux 10 Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-24916 CVE-2020-24379 Reference: ESB-2020.3445 ESB-2020.3322 Original Bulletin: http://www.debian.org/security/2020/dsa-4773 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-4773-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso October 16, 2020 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : yaws CVE ID : CVE-2020-24379 CVE-2020-24916 Two vulnerabilities were discovered in yaws, a high performance HTTP 1.1 webserver written in Erlang. CVE-2020-24379 The WebDAV implementation is prone to a XML External Entity (XXE) injection vulnerability. CVE-2020-24916 The CGI implementation does not properly sanitize CGI requests allowing a remote attacker to execute arbitrary shell commands via specially crafted CGI executable names. For the stable distribution (buster), these problems have been fixed in version 2.0.6+dfsg-1+deb10u1. We recommend that you upgrade your yaws packages. For the detailed security status of yaws please refer to its security tracker page at: https://security-tracker.debian.org/tracker/yaws Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl+KFUpfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0S5sw//SqumYA4G7+NiKxrJUMR+LGg8fap3P7hpiM/oH3WG9zKzMv+vV/3dfNUT ZBOXr/QOJiE5Ah0sD18p8PhSMdFBt1daETgEixFvNcCCIkn7qUNjmTOpN2tMYq9D ehs0I3579d7omqxyRndE60X+4ZmmVdyp6NwR0j4btrnZE1RlBbl5PurUY2BsTiu1 qFuVkGSKp7S6z1Eh6qk9K2T3ooKq25nCvc7mtx2OMePGiaj3YIWQ+YGWWqPDiIfg S/E23WSBmT2JCIY//eDs8YxH4icpnwhwElQfp8qCrRbmWVXdXiTkthuPYKAXHruR B+6WJUH61nMnXaM8KQg1xhup+R2m9w4pr0eFMBQdQX3dZswxzwj975RokGWb76Es n9XXvTlim3qEUBM1VabFH2A0dAawBBOdaCDSMFPHI0KCI+aqO3NWI5yzkrwGPEiU do+TmKIx0F6fiqbip8wU/ql05yg8MzB90PTp+bkGIgYJ1xafNsE7Y7LOV0BI3Bkr Br4b3AGtMFuwEkUWiPyMcQE+D10UhfKCYMplCJSmQb2EdU/ZDeNMxnliSX1UpTV4 SGJSS1hjltwrllmPgF8R9Wdu4TLbJpngvTqLwmss503gKwyocaI3BpBptxAFhi42 NVJE/BQMBeJK1dQloxfNFPliIrwC391nR5tnuguehg9nvXDKDM0= =svY8 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBX4zkXONLKJtyKPYoAQjC+w//REYxJx0t7hb1Btt2M3QdeIHVkG/GWtLD uwFIBXXU4r83yHWXcjqJETahBVPfo9ojf13YMvN6m+0F7CXcLeYwSyUxQb04e2SV +NB4NGKEeB5+rFVGTWGZrQrn/ZTQaYKlcd1QDMqgS4lC2xJ0jSiYXEmzA8KzGCLm NERzc6Bjp2uwmXMUcYNNdlidZXvj8lZ83L1vNzKiIiCSuDRqN9HtKzhB1Yh9sYv2 IL49Ga37cdpxG70pYML7AfuN/S/vgkqQlJMfDWRcDgSnuLzkbHkVylpjDkxEUKdg FzJoVGvUYSM6l5KvREfRT/KB4M3rVrI4OH8cjMMseenrV5aQHCQ08xvHxOLYQnNV ln/tPlYAgltJpZKNMEuSqlJOZnSqbhMniEJaIDXvM96B0dY3PGtg61vsP6AlSFde T/tbf8SYG6hytvBFWDluWNgmeva57yb4loOmWtp9tzjjNY4dvdncXRn5JtAkuvhI 1sXQk5Bz29jD5xnaDica1Idq6sIdylUepUoyVUpVjRRZqZoVunEllSWlT37W2yF2 FHiPu8R9F1eQ6c1UUa7qHpXpeFAdgZOtLALRbXHWTywaf2CrhZsubKMBiY8PkED3 /1fBspwKGTpuDIqg71pFeY6BBvBwNICbTNucOHZfGGZvBKb1kDXrrQkQid0vytsZ 5Ax7e1gNfc0= =o4O3 -----END PGP SIGNATURE-----