-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0244
               Cisco SD-WAN vManage multiple vulnerabilities
                              21 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco SD-WAN vManage Software
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Create Arbitrary Files   -- Existing Account      
                   Access Confidential Data -- Remote/Unauthenticated
                   Unauthorised Access      -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-1349 CVE-2021-1305 CVE-2021-1304
                   CVE-2021-1302 CVE-2021-1259 CVE-2021-1235
                   CVE-2021-1225  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-72EhnUc
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vinfdis-MC8L58dj
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-sqlinjm-xV8dsjq5
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-pathtrav-Z5mCVsjf

Comment: This bulletin contains five (5) Cisco Systems security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco SD-WAN vManage Authorization Bypass Vulnerabilities

Priority:        High
Advisory ID:     cisco-sa-sdwan-abyp-TnGFHrS
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvi59734 CSCvs11283 CSCvu28377
CVE Names:       CVE-2021-1302 CVE-2021-1304 CVE-2021-1305
CWEs:            CWE-20 CWE-284

Summary

  o Multiple vulnerabilities in the web-based management interface of Cisco
    SD-WAN vManage Software could allow an authenticated, remote attacker to
    bypass authorization and modify the configuration of an affected system,
    gain access to sensitive information, and view information that they are
    not authorized to access.

    For more information about these vulnerabilities, see the Details section
    of this advisory.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS

Affected Products

  o Vulnerable Products

    These vulnerabilities affect Cisco devices if they are running a vulnerable
    release of Cisco SD-WAN vManage Software.

    For a device to be affected by CVE-2021-1302, the Multi-Tenant feature must
    be enabled.

    For information about which Cisco software releases are vulnerable, see the
    Fixed Software section of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by these vulnerabilities.

    Cisco has confirmed that these vulnerabilities do not affect the following
    products:

       IOS XE SD-WAN Software
       SD-WAN vBond Orchestrator Software
       SD-WAN vEdge Cloud Routers
       SD-WAN vEdge Routers
       SD-WAN vSmart Controller Software

Details

  o The vulnerabilities are not dependent on one another; exploitation of one
    of the vulnerabilities is not required to exploit another vulnerability. In
    addition, a software release that is affected by one of the vulnerabilities
    may not be affected by the other vulnerabilities.

    Details about the vulnerabilities are as follows:

    CVE-2021-1302: Cisco SD-WAN vManage Authorization Bypass Vulnerability

    A vulnerability in the web-based management interface of Cisco SD-WAN
    vManage Software could allow an authenticated, remote attacker to bypass
    authorization and connect to other vManage tenants that they are not
    authorized to connect to.

    The vulnerability is due to insufficient authorization checks. An attacker
    could exploit this vulnerability by sending crafted HTTP requests to the
    web-based management interface of an affected system. A successful exploit
    could allow the attacker to bypass authorization and connect to other
    vManage tenants that they are not authorized to connect to.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvu28377
    CVE ID: CVE-2021-1302
    Security Impact Rating (SIR): High
    CVSS Base Score: 8.8
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    CVE-2021-1304: Cisco SD-WAN vManage Authorization Bypass Vulnerability

    A vulnerability in the web-based management interface SSH console of Cisco
    SD-WAN vManage Software could allow an authenticated, remote attacker to
    access sensitive information that they are not normally authorized to
    access.

    The vulnerability is due to insufficient authorization checks. An attacker
    could exploit this vulnerability by logging in to the web-based management
    interface and using the SSH console feature. A successful exploit could
    allow the attacker to access sensitive information, which would allow them
    to carry out further attacks.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvs11283
    CVE ID: CVE-2021-1304
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 4.3
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

    CVE-2021-1305: Cisco SD-WAN vManage Authorization Bypass Vulnerability

    A vulnerability in the web-based management interface of Cisco SD-WAN
    vManage Software could allow an authenticated, remote attacker to access
    information such as logs, configurations, and device information that they
    are not authorized to view.

    The vulnerability is due to insufficient authorization checks of user
    account privileges. An attacker could exploit this vulnerability by logging
    in to the web-based management interface with a low-privileged user
    account. A successful exploit could allow the attacker to access sensitive
    information that they are not authorized to view.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvi59734
    CVE ID: CVE-2021-1305
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 4.3
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Workarounds

  o There are no workarounds that address these vulnerabilities.

Fixed Software

  o Cisco has released free software updates that address the vulnerabilities
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
    /en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    Customers are advised to upgrade to an appropriate fixed software release
    as indicated in the following table(s). To ensure a complete upgrade
    solution, consider that this advisory is part of a collection that includes
    the following advisories:

       cisco-sa-sdwan-abyp-TnGFHrS : Cisco SD-WAN vManage Authorization Bypass
        Vulnerabilities
       cisco-sa-sdwan-bufovulns-B5NrSHbj : Cisco SD-WAN Buffer Overflow
        Vulnerabilities
       cisco-sa-sdwan-cmdinjm-9QMSmgcn : Cisco SD-WAN Command Injection
        Vulnerabilities
       cisco-sa-sdwan-dosmulti-48jJuEUP : Cisco SD-WAN Denial of Service
        Vulnerabilities

    Cisco      First Fixed Release    First Fixed Release for All
    SD-WAN     for These              Vulnerabilities Described in the
    Release    Vulnerabilities        Collection of Advisories
    Earlier    Migrate to a fixed     Migrate to a fixed release.
    than 18.3  release.
    18.3       Migrate to a fixed     Migrate to a fixed release.
               release.
    18.4       Migrate to a fixed     Migrate to a fixed release.
               release.
    19.2       Migrate to a fixed     Migrate to a fixed release.
               release.
    19.3       Migrate to a fixed     Migrate to a fixed release.
               release.
    20.1       Migrate to a fixed     Migrate to a fixed release.
               release.
    20.3       20.3.2                 20.3.2
    20.4       20.4.1                 20.4.1

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerabilities that are
    described in this advisory.

Source

  o These vulnerabilities were found during the resolution of a Cisco TAC
    support case.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------------------------------------------------------------

Cisco SD-WAN vManage Cypher Query Language Injection Vulnerability

Priority:        Medium
Advisory ID:     cisco-sa-vmanage-cql-inject-72EhnUc
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvv42576 CSCvw08529
CVE Names:       CVE-2021-1349
CWEs:            CWE-943

Summary

  o A vulnerability in the web-based management interface of Cisco SD-WAN
    vManage Software could allow an authenticated, remote attacker to conduct
    Cypher query language injection attacks on an affected system.

    The vulnerability is due to insufficient input validation by the web-based
    management interface. An attacker could exploit this vulnerability by
    sending crafted HTTP requests to the interface of an affected system. A
    successful exploit could allow the attacker to obtain sensitive
    information.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-72EhnUc

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected Cisco SD-WAN
    vManage Software releases earlier than Release 20.3.2.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, Cisco SD-WAN vManage Software releases 20.3.2
    and later contained the fix for this vulnerability.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o Cisco would like to thank the following people for independently reporting
    this vulnerability:

       Jakub Olszak and Stefan Zaryn
       Pawel Haldrzynski of ISEC Partners

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-72EhnUc

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+



- --------------------------------------------------------------------------------

Cisco SD-WAN vManage Information Disclosure Vulnerability

Priority:        Medium
Advisory ID:     cisco-sa-sdwan-vinfdis-MC8L58dj
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvs11276
CVE Names:       CVE-2021-1235
CWEs:            CWE-497

CVSS Score:
5.5  AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X

Summary

  o A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an
    authenticated, local attacker to read sensitive database files on an
    affected system.

    The vulnerability is due to insufficient user authorization. An attacker
    could exploit this vulnerability by accessing the vshell of an affected
    system. A successful exploit could allow the attacker to read database
    files from the filesystem of the underlying operating system.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vinfdis-MC8L58dj

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected Cisco SD-WAN
    vManage releases earlier than Release 19.2.3.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, Cisco SD-WAN vManage releases 19.2.3, 20.1.1,
    20.3.1, 20.4.1, and later contained the fix for this vulnerability.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during the resolution of a Cisco TAC support
    case.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vinfdis-MC8L58dj

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+



- --------------------------------------------------------------------------------

Cisco SD-WAN vManage SQL Injection Vulnerabilities

Priority:        Medium
Advisory ID:     cisco-sa-vman-sqlinjm-xV8dsjq5
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvi59726 CSCvk28609 CSCvk28656 CSCvk28667 CSCvs99259
CVE Names:       CVE-2021-1225
CWEs:            CWE-89

CVSS Score:
6.5  AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:X/RL:X/RC:X

Summary

  o Multiple vulnerabilities in the web-based management interface of Cisco
    SD-WAN vManage Software could allow an unauthenticated, remote attacker to
    conduct SQL injection attacks on an affected system.

    These vulnerabilities exist because the web-based management interface
    improperly validates values in SQL queries. An attacker could exploit these
    vulnerabilities by authenticating to the application and sending malicious
    SQL queries to an affected system. A successful exploit could allow the
    attacker to modify values on or return values from the underlying database
    or the operating system.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-sqlinjm-xV8dsjq5

Affected Products

  o Vulnerable Products

    At the time of publication, these vulnerabilities affected Cisco SD-WAN
    vManage Software releases earlier than Release 19.2.3.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by these vulnerabilities.

Workarounds

  o There are no workarounds that address these vulnerabilities.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, Cisco SD-WAN vManage releases 19.2.3 and later
    contained the fix for these vulnerabilities.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerabilities that are
    described in this advisory.

Source

  o These vulnerabilities were found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-sqlinjm-xV8dsjq5

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+



- --------------------------------------------------------------------------------

Cisco SD-WAN vManage Software Path Traversal Vulnerability

Priority:        Medium
Advisory ID:     cisco-sa-vman-pathtrav-Z5mCVsjf
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvi59632 CSCvk28549
CVE Names:       CVE-2021-1259
CWEs:            CWE-22

CVSS Score:
5.3  AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N/E:X/RL:X/RC:X

Summary

  o A vulnerability in the web-based management interface of Cisco SD-WAN
    vManage Software could allow an authenticated, remote attacker to conduct
    path traversal attacks and obtain write access to sensitive files on an
    affected system.

    The vulnerability is due to insufficient validation of HTTP requests. An
    attacker could exploit this vulnerability by sending a crafted HTTP request
    that contains directory traversal character sequences to an affected
    system. A successful exploit could allow the attacker to write arbitrary
    files on the affected system.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-pathtrav-Z5mCVsjf

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected Cisco SD-WAN
    vManage Software releases earlier than Release 18.2.0.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, Cisco SD-WAN vManage Software releases 18.2.0
    and later contained the fix for this vulnerability.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during the resolution of a Cisco TAC support
    case.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-pathtrav-Z5mCVsjf

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=frXg
-----END PGP SIGNATURE-----