copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2014.1035 - [Win][UNIX/Linux][Debian] gnupg: Denial of service - Remote/unauthenticated

Date: 26 June 2014
References: ESB-2014.1050  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1035
                           gnupg security update
                               26 June 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gnupg
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-4617  

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-2967

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running gnupg check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2967-1                   security@debian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
June 25, 2014                          http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : gnupg
CVE ID         : CVE-2014-4617
Debian Bug     : 752497

Jean-René Reinhard, Olivier Levillain and Florian Maury reported that
GnuPG, the GNU Privacy Guard, did not properly parse certain garbled
compressed data packets. A remote attacker could use this flaw to mount
a denial of service against GnuPG by triggering an infinite loop.

For the stable distribution (wheezy), this problem has been fixed in
version 1.4.12-7+deb7u4.

For the unstable distribution (sid), this problem has been fixed in
version 1.4.16-1.2.

We recommend that you upgrade your gnupg packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=udZa
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBU6uWuRLndAQH1ShLAQKauQ//Z5hXpwm/8e8ZEEU+4c3MeH0PrFyDwE18
PujzSNBUG6cQFAI7c2yIhAUINQ61WufS00mIfKm4ItTE0ERqKR7ix+v9+RpgeiBa
y5cwcZ2XxjRxzLrMbQ/fw5YslAwp2qlGjGaZt0rSPO/gDe1kpZFXZ76ebipZ9uVG
YpIS2jKfu5BSxA2/r62jRXC13pvCVV2l58Du40Vgpo/WdwL+Qmpk5ExOpomWgOju
3NkHy/3lDRi5B5QvcStn4yqlTPZAnSEuUSBJjScoVpLP9zEhnvj9mNW14kMjvrx+
lq2Xneu0yKLO9LDSyc1Th0dfGI/aWt6O0ZwiyWx6UNvZ59RmG2gr4EXp9jQXGpo9
FB+m4g0ghLkRiYGH8/d64gLMRWLYKsHd0JsjUIatBAkgapezLVSxHBxaB+3aiCE+
AHsU0EZ+Bp7paySS6NC7t2u3ZCUZNRmKQa4yFup+yZQgzMKn8vdkVloGXWvpEEO+
z2Robx3HF6IK+IkyNAlilGyGQua25l3p5XuSwyXoADKwmT1I0kVOgIqoOLf+kHvr
jWmKStk16yVkr7jYL4dnCl6wk3Kv3SbGQPMYyTsDUcbMh2IEexitjGddI3dXFQ3y
3uRqlreJMM5sOBnVx3Tfu44iMtui+WYKJseeOkXdsfWfVyxKLg8Pfdm6wLWiZ46f
CNz6HtuH+H8=
=18KZ
-----END PGP SIGNATURE-----