[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 80/04 - Five SCO Security Advisories



----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 80/04 dated 24.02.04  Time: 11:00  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
----------------------------------------------------------------------------------

Title
=====

Five SCO Security Advisories:

1. cache poisoning BIND 8 prior to 8.3.7 and BIND 8.4.x prior 8.4.2

2. OpenLinux: Fetchmail 6.2.4 and earlier remote dennial of service. 

3. OpenLinux: mpg123 remote denial of service and heap-based buffer overflow

4. OpenLinux: Multiple vulnerabilities were discovered in the saned daemon

5. OpenLinux: Perl Safe.pm unsafe access 

Detail
====== 

1. BIND is an implementation of the Domain Name System (DNS) protocols.
   Successful exploitation of this vulnerability may result in a temporary
   denial of service.
	
2. Fetchmail 6.2.4 and earlier does not properly allocate memory for long 
   lines, which allows remote attackers to cause a denial of service (crash)
   via a certain email. 
	
3. mpg123 0.59r allows remote attackers to cause a denial of service and possibly
   service and possibly execute arbitrary code via an MP3 file with a zero bitrate, 
   which creates a negative frame size.

4. Six different vulnerabilities in the saned daemon.

5. When Perl code is executed within a Safe compartment, it cannot access variables 
   access variables outside of the compartment unless the outside code chooses to
   code chooses to share the variables with the code inside the compartment.
	



1.
______________________________________________________________________________

			SCO Security Advisory

Subject:		OpenLinux: Bind: cache poisoning BIND 8 prior to 8.3.7 and BIND 8.4.x prior 8.4.2
Advisory number: 	CSSA-2004-003.0
Issue date: 		2004 February 19
Cross reference:	sr886764 fz528462 erg712477 CAN-2003-0914
______________________________________________________________________________


1. Problem Description

	CERT/CC Incident Note VU#734644 

	BIND is an implementation of the Domain Name System (DNS) 
	protocols. Successful exploitation of this vulnerability 
	may result in a temporary denial of service. 

	The Common Vulnerabilities and Exposures project (cve.mitre.org) 
	has assigned the name CAN-2003-0914 to this issue.


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------
	OpenLinux 3.1.1 Server		prior to bind-8.3.7-1.i386.rpm
					prior to bind-doc-8.3.7-1.i386.rpm
					prior to bind-utils-8.3.7-1.i386.rpm

	OpenLinux 3.1.1 Workstation	prior to bind-8.3.7-1.i386.rpm
					prior to bind-doc-8.3.7-1.i386.rpm
					prior to bind-utils-8.3.7-1.i386.rpm


3. Solution

	The proper solution is to install the latest packages. Many
	customers find it easier to use the Caldera System Updater, called
	cupdate (or kcupdate under the KDE environment), to update these
	packages rather than downloading and installing them by hand.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-003.0/RPMS

	4.2 Packages

	5bbeb4009cd1c63070d7edabc36838cd	bind-8.3.7-1.i386.rpm
	80582975955be472cc5dbb9eff171f72	bind-doc-8.3.7-1.i386.rpm
	28b0522cb6a0d661337e58f05f264766	bind-utils-8.3.7-1.i386.rpm

	4.3 Installation

	rpm -Fvh bind-8.3.7-1.i386.rpm
	rpm -Fvh bind-doc-8.3.7-1.i386.rpm
	rpm -Fvh bind-utils-8.3.7-1.i386.rpm

	4.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-003.0/SRPMS

	4.5 Source Packages

	08c17ced9fbed8ad680aad1f1df903f8	bind-8.3.7-1.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-003.0/RPMS

	5.2 Packages

	f5acabf134676668f0d669d5d58feda0	bind-8.3.7-1.i386.rpm
	ac156c2e52b12aa8d46c94d5d7a37c7a	bind-doc-8.3.7-1.i386.rpm
	b8fb4eba73037973a85752d0c07aea03	bind-utils-8.3.7-1.i386.rpm

	5.3 Installation

	rpm -Fvh bind-8.3.7-1.i386.rpm
	rpm -Fvh bind-doc-8.3.7-1.i386.rpm
	rpm -Fvh bind-utils-8.3.7-1.i386.rpm

	5.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-003.0/SRPMS

	5.5 Source Packages

	90229c9bbc06fe554b39eba9d3b3aa95	bind-8.3.7-1.src.rpm


6. References

	Specific references for this advisory:
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0914
		http://www.kb.cert.org/vuls/id/734644

	SCO security resources:
		http://www.sco.com/support/security/index.html

	This security fix closes SCO incidents sr886764 fz528462
	erg712477.


7. Disclaimer

	SCO is not responsible for the misuse of any of the information
	we provide on this website and/or through our security
	advisories. Our advisories are a service to our customers intended
	to promote secure installation and use of SCO products.


8. Acknowledgements
	
	SCO would like to thank CERT and The Internet Software Consortium.






2.
______________________________________________________________________________

			SCO Security Advisory

Subject:		OpenLinux: Fetchmail 6.2.4 and earlier remote dennial of service 
Advisory number: 	CSSA-2004-004.0
Issue date: 		2004 February 19
Cross reference:	sr886097 fz528427 erg712468 CAN-2003-0792
______________________________________________________________________________


1. Problem Description

	Fetchmail 6.2.4 and earlier does not properly allocate memory for
	long lines, which allows remote attackers to cause a denial of
	service (crash) via a certain email. 

	Fetchmail is a full-featured, robust, well-documented remote-mail 
	retrieval and forwarding utility intended to be used over on-
	demand TCP/IP links (such as SLIP or PPP connections). It supports 
	every remote-mail protocol now in use on the Internet: POP2, POP3, 
	RPOP, APOP, KPOP, all flavors of IMAP, ETRN, and ODMR. It can even 
	support IPv6 and IPSEC. 

	Fetchmail retrieves mail from remote mail servers and forwards it 
	via SMTP, so it can then be read by normal mail user agents such as 
	mutt, elm(1) or BSD Mail. It allows all your system MTA's filtering, 
	forwarding, and aliasing facilities to work just as they would on 
	normal mail. 

	The Common Vulnerabilities and Exposures project (cve.mitre.org) has 
	assigned the name CAN-2003-0792 to this issue.


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------
	OpenLinux 3.1.1 Server		prior to fetchmail-6.2.5-1.i386.rpm
					prior to fetchmailconf-6.2.5-1.i386.rpm

	OpenLinux 3.1.1 Workstation	prior to fetchmail-6.2.5-1.i386.rpm
					prior to fetchmailconf-6.2.5-1.i386.rpm


3. Solution

	The proper solution is to install the latest packages. Many
	customers find it easier to use the Caldera System Updater, called
	cupdate (or kcupdate under the KDE environment), to update these
	packages rather than downloading and installing them by hand.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-004.0/RPMS

	4.2 Packages

	60ded90624478cf42bbafdb3530b1431	fetchmail-6.2.5-1.i386.rpm
	b5812d5463a264a37dbeac6a3f3084f0	fetchmailconf-6.2.5-1.i386.rpm

	4.3 Installation

	rpm -Fvh fetchmail-6.2.5-1.i386.rpm
	rpm -Fvh fetchmailconf-6.2.5-1.i386.rpm

	4.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-004.0/SRPMS

	4.5 Source Packages

	f7fea66f02c98436847aab205922a180	fetchmail-6.2.5-1.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-004.0/RPMS

	5.2 Packages

	195568e0570b8e0682d93b3d27a4d3de	fetchmail-6.2.5-1.i386.rpm
	7d81aed49392ce9df04ae4b421fd80e7	fetchmailconf-6.2.5-1.i386.rpm

	5.3 Installation

	rpm -Fvh fetchmail-6.2.5-1.i386.rpm
	rpm -Fvh fetchmailconf-6.2.5-1.i386.rpm

	5.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-004.0/SRPMS

	5.5 Source Packages

	3035d06b88de3840707e2e180304ee53	fetchmail-6.2.5-1.src.rpm


6. References

	Specific references for this advisory:
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0792

	SCO security resources:
		http://www.sco.com/support/security/index.html

	This security fix closes SCO incidents sr886097 fz528427
	erg712468.


7. Disclaimer

	SCO is not responsible for the misuse of any of the information
	we provide on this website and/or through our security
	advisories. Our advisories are a service to our customers intended
	to promote secure installation and use of SCO products.


8. Acknowledgements

	SCO would like to thank Dave Jones and Mark Cox at Red Hat.







3.

______________________________________________________________________________

			SCO Security Advisory

Subject:		OpenLinux: mpg123 remote denial of service and heap-based buffer overflow
Advisory number: 	CSSA-2004-002.0
Issue date: 		2004 February 19
Cross reference: 	sr882700 fz528149 erg712383 CAN-2003-0577 CAN-2003-0865
______________________________________________________________________________


1. Problem Description

	mpg123 0.59r allows remote attackers to cause a denial of
	service and possibly execute arbitrary code via an MP3 file
	with a zero bitrate, which creates a negative frame size. 

	The Common Vulnerabilities and Exposures project (cve.mitre.org)
	has assigned the name CAN-2003-0577 to this issue. 

	Heap-based buffer overflow in readstring of httpget.c for mpg123 
	0.59r and 0.59s allows remote attackers to execute arbitrary code 
	via a long request. 

	The Common Vulnerabilities and Exposures project (cve.mitre.org) 
	has assigned the name CAN-2003-0865 to this issue.


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------
	OpenLinux 3.1.1 Server		prior to mpg123-0.59r-7MR.i386.rpm
	OpenLinux 3.1.1 Workstation	prior to mpg123-0.59r-7MR.i386.rpm


3. Solution

	The proper solution is to install the latest packages. Many
	customers find it easier to use the Caldera System Updater, called
	cupdate (or kcupdate under the KDE environment), to update these
	packages rather than downloading and installing them by hand.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-002.0/RPMS

	4.2 Packages

	cb8a81f231da3c943dfaa366df68045a	mpg123-0.59r-7MR.i386.rpm

	4.3 Installation

	rpm -Fvh mpg123-0.59r-7MR.i386.rpm

	4.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-002.0/SRPMS

	4.5 Source Packages

	810ef880b6ad68ea7aea631241552dad	mpg123-0.59r-7MR.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-002.0/RPMS

	5.2 Packages

	13165b654404e73fe934cc13347c81b3	mpg123-0.59r-7MR.i386.rpm

	5.3 Installation

	rpm -Fvh mpg123-0.59r-7MR.i386.rpm

	5.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-002.0/SRPMS

	5.5 Source Packages

	98203970951e6c87d715170324a8ca2c	mpg123-0.59r-7MR.src.rpm


6. References

	Specific references for this advisory:
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0577
		http://www.securityfocus.com/archive/1/306903
		http://www.securityfocus.com/bid/6629
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865
		http://www.securityfocus.com/archive/1/338641
		http://marc.theaimsgroup.com/?l=bugtraq&m=106493686331198&w=2
		http://www.securityfocus.com/bid/8680

	SCO security resources:
		http://www.sco.com/support/security/index.html

	This security fix closes SCO incidents sr882700 fz528149
	erg712383.


7. Disclaimer

	SCO is not responsible for the misuse of any of the information
	we provide on this website and/or through our security
	advisories. Our advisories are a service to our customers intended
	to promote secure installation and use of SCO products.


8. Acknowledgements

	SCO would like to thank 3APA3A and Vade79. ______________________________________________________________________________







4.
______________________________________________________________________________

			SCO Security Advisory

Subject:		OpenLinux: Multiple vulnerabilities were discovered in the saned daemon
Advisory number: 	CSSA-2004-005.0
Issue date: 		2004 February 19
Cross reference:	sr886093 fz528425 erg712466 CAN-2003-0773 CAN-2003-0774 CAN-2003-0775 CAN-2003-0776 CAN-2003-0777
CAN-2003-0778
______________________________________________________________________________


1. Problem Description

	CAN-2003-0773 saned in sane-backends 1.0.7 and earlier does
	not check the IP address of the connecting host during the
	SANE_NET_INIT RPC call, which allows remote attackers to use that
	call even if they are restricted in saned.conf. 
	
	CAN-2003-0774 saned in sane-backends 1.0.7 and earlier does not quickly
	handle connection drops, which allows remote attackers to
	cause a denial of service (segmentation fault) when invalid
	memory is accessed. 

	CAN-2003-0775 saned in sane-backends 1.0.7
	and earlier calls malloc with an arbitrary size value if a
	connection is dropped before the size value has been sent, which
	allows remote attackers to cause a denial of service (memory
	consumption or crash). 

	CAN-2003-0776 saned in sane-backends
	1.0.7 and earlier does not properly "check the validity of
	the RPC numbers it gets before getting the parameters," with
	unknown consequences. 

	CAN-2003-0777 saned in sane-backends 1.0.7
	and earlier, when debug messages are enabled, does not properly
	handle dropped connections, which can prevent strings from being
	null terminated and cause a denial of service (segmentation
	fault). 

	CAN-2003-0778 saned in sane-backends 1.0.7 and earlier,
	and possibly later versions, does not properly allocate memory
	in certain cases, which could allow attackers to cause a denial
	of service (memory consumption).


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------
	OpenLinux 3.1.1 Server		prior to sane-1.0.13-1.i386.rpm
					prior to sane-devel-1.0.13-1.i386.rpm

	OpenLinux 3.1.1 Workstation	prior to sane-1.0.13-1.i386.rpm
					prior to sane-devel-1.0.13-1.i386.rpm


3. Solution

	The proper solution is to install the latest packages. Many
	customers find it easier to use the Caldera System Updater, called
	cupdate (or kcupdate under the KDE environment), to update these
	packages rather than downloading and installing them by hand.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-005.0/RPMS

	4.2 Packages

	551a28ff2aa0a74e086972d8bdba7657	sane-1.0.13-1.i386.rpm
	3082901716b19a271fc14cc2b8356c7e	sane-devel-1.0.13-1.i386.rpm

	4.3 Installation

	rpm -Fvh sane-1.0.13-1.i386.rpm
	rpm -Fvh sane-devel-1.0.13-1.i386.rpm

	4.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-005.0/SRPMS

	4.5 Source Packages

	0be6d309556ddb7f588437c4435e1e42	sane-1.0.13-1.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-005.0/RPMS

	5.2 Packages

	c9b9c0ee81ba3e2b09ca743703718007	sane-1.0.13-1.i386.rpm
	a313dbf67a26110d3a3fae1a39ffd592	sane-devel-1.0.13-1.i386.rpm

	5.3 Installation

	rpm -Fvh sane-1.0.13-1.i386.rpm
	rpm -Fvh sane-devel-1.0.13-1.i386.rpm

	5.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-005.0/SRPMS

	5.5 Source Packages

	6ccf84292c1decf88207c26bff0001f1	sane-1.0.13-1.src.rpm


6. References

	Specific references for this advisory:
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0773
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0774
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0775
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0776
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0777
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0778

	SCO security resources:
		http://sco.com/support/security/index.html

	This security fix closes SCO incidents sr886093 fz528425
	erg712466.


7. Disclaimer

	SCO is not responsible for the misuse of any of the information
	we provide on this website and/or through our security
	advisories. Our advisories are a service to our customers intended
	to promote secure installation and use of SCO products.

______________________________________________________________________________







5.



______________________________________________________________________________

			SCO Security Advisory

Subject:		OpenLinux: Perl Safe.pm unsafe access
Advisory number: 	CSSA-2004-007.0
Issue date: 		2004 February 20
Cross reference:	sr887196 fz528498 erg712494 CAN-2002-1323
______________________________________________________________________________


1. Problem Description

	When Perl code is executed within a Safe compartment, it cannot
	access variables outside of the compartment unless the outside
	code chooses to share the variables with the code inside the
	compartment. 

	If code inside a Safe compartment is executed via Safe->reval() 
	twice, it is able to change its operation mask the second time. 
	This could allow the code to access variables outside the Safe 
	compartment. 

	Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may 
	allow attackers to break out of safe compartments in (1) Safe::reval 
	or (2) Safe::rdo using a redefined @_ variable, which is not reset 
	between successive calls.

	The Common Vulnerabilities and Exposures project (cve.mitre.org) 
	has assigned the name CAN-2002-1323 to this issue.


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------
	OpenLinux 3.1.1 Server		prior to perl-5.8.3-1.i386.rpm
					prior to perl-add-5.8.3-1.i386.rpm
					prior to perl-man-5.8.3-1.i386.rpm
					prior to perl-pod-5.8.3-1.i386.rpm

	OpenLinux 3.1.1 Workstation	prior to perl-5.8.3-1.i386.rpm
					prior to perl-add-5.8.3-1.i386.rpm
					prior to perl-man-5.8.3-1.i386.rpm
					prior to perl-pod-5.8.3-1.i386.rpm


3. Solution

	The proper solution is to install the latest packages. Many
	customers find it easier to use the Caldera System Updater, called
	cupdate (or kcupdate under the KDE environment), to update these
	packages rather than downloading and installing them by hand.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-007.0/RPMS

	4.2 Packages

	8fc1043f58ddc9f2c48a392e3a9e5707	perl-5.8.3-1.i386.rpm
	c52377b6aa6ba00169108fdf1060e239	perl-add-5.8.3-1.i386.rpm
	cb4dbc39349ea672b47bfc776f3b0fa4	perl-man-5.8.3-1.i386.rpm
	010741a985deaf7e2b8a289d3e4b4b8b	perl-pod-5.8.3-1.i386.rpm

	4.3 Installation

	rpm -Fvh perl-5.8.3-1.i386.rpm
	rpm -Fvh perl-add-5.8.3-1.i386.rpm
	rpm -Fvh perl-man-5.8.3-1.i386.rpm
	rpm -Fvh perl-pod-5.8.3-1.i386.rpm

	4.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-007.0/SRPMS

	4.5 Source Packages

	aa44c605f0c3c82cef1096c2c9f1e958	perl-5.8.3-1.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-007.0/RPMS

	5.2 Packages

	21a823ce2022d2c3a69848b48d06d9de	perl-5.8.3-1.i386.rpm
	77b22dc0bdf24d927e635e76f4706a05	perl-add-5.8.3-1.i386.rpm
	eb60dd4c6abc0f4b9894ea6a1473ffdc	perl-man-5.8.3-1.i386.rpm
	357d02c4844793bc36b7e92c41bb2e26	perl-pod-5.8.3-1.i386.rpm

	5.3 Installation

	rpm -Fvh perl-5.8.3-1.i386.rpm
	rpm -Fvh perl-add-5.8.3-1.i386.rpm
	rpm -Fvh perl-man-5.8.3-1.i386.rpm
	rpm -Fvh perl-pod-5.8.3-1.i386.rpm

	5.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-007.0/SRPMS

	5.5 Source Packages

	6b1fdec04ed3c6d4de7b0c65528e71cd	perl-5.8.3-1.src.rpm


6. References

	Specific references for this advisory:
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1323
		http://www.iss.net/security_center/static/10574.php
		http://www.securityfocus.com/bid/6111
		http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0061.html
		http://use.perl.org/articles/02/10/06/1118222.shtml?tid=5
		http://bugs6.perl.org/rt2/Ticket/Display.html?id=17744


	SCO security resources:
		http://www.sco.com/support/security/index.html

	This security fix closes SCO incidents sr887196 fz528498
	erg712494.


7. Disclaimer

	SCO is not responsible for the misuse of any of the information
	we provide on this website and/or through our security
	advisories. Our advisories are a service to our customers intended
	to promote secure installation and use of SCO products.


8. Acknowledgements

	SCO would like to thank Andreas Jurenda

______________________________________________________________________________

_____________________________________________________________________________
For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of SCO for the information 
contained in this Briefing. 
----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
----------------------------------------------------------------------------------
<End of UNIRAS Briefing>