copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2016.0310 - [Win][UNIX/Linux][Debian] polarssl: Multiple vulnerabilities

Date: 08 February 2016

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0310
                         polarssl security update
                              8 February 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           polarssl
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   Debian GNU/Linux 8
                   Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-8036 CVE-2015-5291 

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3468

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running polarssl check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3468-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
February 06, 2016                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : polarssl
CVE ID         : CVE-2015-5291 CVE-2015-8036
Debian Bug     : 801413

It was discovered that polarssl, a library providing SSL and TLS
support, contained two heap-based buffer overflows that could allow a
remote attacker to trigger denial of service (via application crash)
or arbitrary code execution.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.2.9-1~deb7u6.

For the stable distribution (jessie), these problems have been fixed in
version 1.3.9-2.1+deb8u1.

We recommend that you upgrade your polarssl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCgAGBQJWtkfZAAoJEBC+iYPz1Z1kxWEH/1fsiH2n6XQugpHDNHB9Iosz
XHKqBylycjr9+RLXk+7HQ0wFeX+R4uKORPUsMK4ryaSpVqUs7vd5qU7obBH+7+XG
mvJpTq97vZTY17TI0NWTjMJN44i87p5XLRHMhv5VwdayP/ao72Yvx/aZzu7PRdbw
reULAgoYoIt1ln/h824TvFv24BgAGetYT6j6PXmDoYBomcu2xICoGM0aLY1fHAqt
qf5NWD+iu6WlLVwRBqu0RAzh/c+NfbLizGkyWGF9sl6svzfbd1Dd/U6osHp42QZK
an41m17Z2e3N6hGrKTpvwrAhfx8Gc26z5O1iC1i6g163RiUFHgbDC3sWbEzK7/0=
=FmHk
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVrfgkX6ZAP0PgtI9AQKqRQ//a9TKqFpO56/hZu9fdfTMZTh1wOv1DtRt
O3cPTJO4R9i2lfZPTvfV2nlTBlojAdRQpprZiiYtjRvMFe559nLATCfFislC3Y5m
DiFWm7wci2lVlsj/xpC8/6kyjLOvoD5i8S2eZFHgkZygbUesQ6ymyARSErh6SAJJ
+jpfJhZMsLago9E2NTppYZg6j4vQYlwe5R94g+V3512VHZihi+kVcgw5l60oBzED
e8ZCvTlMntk5mPuD72hj1nNKIkda59iHZWdzqTnyw6X3GB+gSxyUXy01Lh6BFbFY
RKB6sejeQvRO9ANXzQwbACu9YfTLcdrEt8r4ErD6Yw/nSUzTVhZDBahpSdViwhuZ
QusD7l/sWlFiX3U77vL/Mq9ATSrRIbbXmCSg/+5hw7uyXSTUa8jCX0TdttZpa2oR
8VF9LS2G0EpFlvK0lM8USGpTW6gK2YbislAAxnuyiCIn8Row7mWsoYHndy814Ahk
XpGbZkdFrz2bUlP4FJ5BIs4+K9Uy9le2vx1X2hWCyBnJ15HBM/zzQO9BzWzvIU7B
fbzEadbYbI7rdnYv7nWkNwEhR1Z7CvewhA1djlQ/r0Eb8a5lt6zFhvcmCK8PBgYD
l8opqsf79FAspKj3VlNYmutVdVQvGPsaagcbMEPafZocZ0EW6z7PNoR2+ugpoPHi
TfW8qbdjz5I=
=wat1
-----END PGP SIGNATURE-----