[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 762/06 - Two Debian Security Advisories:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

 UNIRAS (UK Government CERT) Briefing - 762/06 dated 20.11.06 time 15:10
 UNIRAS is part of NISCC (the UK National Infrastructure Security
 Co-ordination Centre)
______________________________________________________________________________

 UNIRAS material is available from the NISCC website at www.niscc.gov.uk
______________________________________________________________________________

Title
=====

Two Debian Security Advisories:

1. DSA 1207-2 - New phpmyadmin packages fix regression

2. DSA 1213-1 - New imagemagick packages fix several vulnerabilities

Detail
======

1. The phpmyadmin update in DSA 1207 introduced a regression. This update
corrects this flaw. For completeness, the original advisory text below:
Several remote vulnerabilities have been discovered in phpMyAdmin, a
program to administrate MySQL over the web. 

2. Several remote vulnerabilities have been discovered in Imagemagick,
a collection of image manipulation programs, which may lead to the
execution of arbitrary code. 




1.



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 1207-2                    security@xxxxxxxxxx
http://www.debian.org/security/                         Moritz Muehlenhoff
November 19th, 2006                     http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : phpmyadmin
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2006-1678 CVE-2006-2418 CVE-2005-3621 CVE-2005-3665 CVE-2006-5116
Debian Bug     : 339437 340438 362567 368082 391090

The phpmyadmin update in DSA 1207 introduced a regression. This update
corrects this flaw. For completeness, the original advisory text below:
 
Several remote vulnerabilities have been discovered in phpMyAdmin, a
program to administrate MySQL over the web. The Common Vulnerabilities
and Exposures project identifies the following problems:

CVE-2005-3621

    CRLF injection vulnerability allows remote attackers to conduct
    HTTP response splitting attacks.

CVE-2005-3665

    Multiple cross-site scripting (XSS) vulnerabilities allow remote
    attackers to inject arbitrary web script or HTML via the (1) HTTP_HOST
    variable and (2) various scripts in the libraries directory that
    handle header generation.

CVE-2006-1678

    Multiple cross-site scripting (XSS) vulnerabilities allow remote
    attackers to inject arbitrary web script or HTML via scripts in the
    themes directory.

CVE-2006-2418

    A cross-site scripting (XSS) vulnerability allows remote attackers
    to inject arbitrary web script or HTML via the db parameter of
    footer.inc.php.

CVE-2006-5116

    A remote attacker could overwrite internal variables through the
    _FILES global variable.

For the stable distribution (sarge) these problems have been fixed in
version 2.6.2-3sarge3.

For the upcoming stable release (etch) and unstable distribution (sid)
these problems have been fixed in version 2.9.0.3-1.

We recommend that you upgrade your phpmyadmin package.

Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge3.dsc
      Size/MD5 checksum:      604 32ee16f4370604bc150d93c5676fface
    http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge3.diff.gz
      Size/MD5 checksum:    38520 f27c4b99bbdb3dc13fb71aef99749247
    http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2.orig.tar.gz
      Size/MD5 checksum:  2654418 05e33121984824c43d94450af3edf267

  Architecture independent components:

    http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge3_all.deb
      Size/MD5 checksum:  2769182 00f14fb52a14546e92ece84c16cd249f


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFYFPdXm3vHE4uyloRAgj5AJ4k0NXBlTZgTK+vJTlgPNTEBfeBGgCg61oX
s2aDzIfiBIc0hbLjIGOwEcQ=
=EQpq
- -----END PGP SIGNATURE-----



2.


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 1213-1                    security@xxxxxxxxxx
http://www.debian.org/security/                         Moritz Muehlenhoff
November 19th, 2006                     http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : imagemagick
Vulnerability  : several
Problem-Type   : local(remote)
Debian-specific: no
CVE ID         : CVE-2006-0082 CVE-2006-4144 CVE-2006-5456 CVE-2006-5868
Debian Bug     : 345876 383314 393025

Several remote vulnerabilities have been discovered in Imagemagick,
a collection of image manipulation programs, which may lead to the
execution of arbitrary code. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2006-0082

    Daniel Kobras discovered that Imagemagick is vulnerable to format
    string attacks in the filename parsing code.

CVE-2006-4144

    Damian Put discovered that Imagemagick is vulnerable to buffer
    overflows in the module for SGI images.

CVE-2006-5456

    M Joonas Pihlaja discovered that Imagemagick is vulnerable to buffer
    overflows in the module for DCM and PALM images.

CVE-2006-5868

    Daniel Kobras discovered that Imagemagick is vulnerable to buffer
    overflows in the module for SGI images.

This update also adresses regressions in the XCF codec, which were
introduced in the previous security update.

For the stable distribution (sarge) these problems have been fixed in
version 6:6.0.6.2-2.8.

For the upcoming stable distribution (etch) these problems have been
fixed in version 7:6.2.4.5.dfsg1-0.11.

For the unstable distribution (sid) these problems have been fixed in
version 7:6.2.4.5.dfsg1-0.11.

We recommend that you upgrade your imagemagick packages.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8.dsc
      Size/MD5 checksum:      881 0f3c7174962dcaf0be7b3027312d3438
    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8.diff.gz
      Size/MD5 checksum:   142001 c2be91d527c1714ee0ece93b090792c7
    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2.orig.tar.gz
      Size/MD5 checksum:  6824001 477a361ba0154cc2423726fab4a3f57c

  Alpha architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8_alpha.deb
      Size/MD5 checksum:  1469720 b311ede0075f36157e9c9c244a382cb6
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.8_alpha.deb
      Size/MD5 checksum:   173974 34306082902f34914d4d0823f0e153c8
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.8_alpha.deb
      Size/MD5 checksum:   288800 fa2b7d2ad5708e66fbc5c14f830bace0
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.8_alpha.deb
      Size/MD5 checksum:  1285588 cabe582c14962459c8bc8dffc7d3a516
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.8_alpha.deb
      Size/MD5 checksum:  2204442 080e9f6d25c7b1f1df10dd1828f85273
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.8_alpha.deb
      Size/MD5 checksum:   143902 98099204464269c5386244cb1fee775f

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8_amd64.deb
      Size/MD5 checksum:  1466352 d50a197f3c3f0e15f1530d56177a1c72
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.8_amd64.deb
      Size/MD5 checksum:   163602 642d806539f42d3bd3645edb021bae16
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.8_amd64.deb
      Size/MD5 checksum:   228744 9b7c462060e0769f1561da5dcfb32dee
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.8_amd64.deb
      Size/MD5 checksum:  1194980 51182a82a05f1f47c435f246a21469ad
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.8_amd64.deb
      Size/MD5 checksum:  1550348 43d9d80bd42b3dc6f6d611a997a17c2e
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.8_amd64.deb
      Size/MD5 checksum:   231800 6375c61e8edc60fa928665cf45ec011c

  ARM architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8_arm.deb
      Size/MD5 checksum:  1466148 a0c6fcb562afa6d5f8736beda4dade43
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.8_arm.deb
      Size/MD5 checksum:   149342 9a184c8f6d3d204748ed30a1c57dbd1f
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.8_arm.deb
      Size/MD5 checksum:   234806 0d4865aaf1dd850604ce9b728e65def6
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.8_arm.deb
      Size/MD5 checksum:  1204646 02fbc1c7b8b98d1977e4861211f1255a
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.8_arm.deb
      Size/MD5 checksum:  1647698 cef197d1c2ce919413ab12bd1b99187a
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.8_arm.deb
      Size/MD5 checksum:   230484 5b5dbe487dc580a5f164cf862552ab4d

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8_hppa.deb
      Size/MD5 checksum:  1468290 329777db0d2b061398268f9fd8d6a7a7
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.8_hppa.deb
      Size/MD5 checksum:   182170 e190aad821d4e96ba2b84fc4d3b49da8
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.8_hppa.deb
      Size/MD5 checksum:   273890 434201d0f53175e739ce45addbe2ce01
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.8_hppa.deb
      Size/MD5 checksum:  1404728 cfe2739dac2b84497a00f92b5c4b36ad
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.8_hppa.deb
      Size/MD5 checksum:  1827810 14e7e2febd80f1551cfa9b035ed9222c
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.8_hppa.deb
      Size/MD5 checksum:   243804 e4bfc17d51547976f7f4db09f6cc6997

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8_i386.deb
      Size/MD5 checksum:  1466106 0ee2e904990dbcbeee0b90c2fa95ac62
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.8_i386.deb
      Size/MD5 checksum:   164440 708d64c7a92419a98e7d305089b1b0c4
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.8_i386.deb
      Size/MD5 checksum:   208932 eed51be1f03a91e624194e9dea211ff2
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.8_i386.deb
      Size/MD5 checksum:  1172262 22f32c18dc71c7b24eff16f1fec1c243
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.8_i386.deb
      Size/MD5 checksum:  1507516 ea9e1148fa72e6be94462a46d30304b0
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.8_i386.deb
      Size/MD5 checksum:   233964 e47cbf76b993c0eb44adcf85e125d75c

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8_ia64.deb
      Size/MD5 checksum:  1468472 6b31e556cf944fe2d89ad8d2c09cc43a
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.8_ia64.deb
      Size/MD5 checksum:   188272 7bf4012fe64aa60c8aac88b263b620c4
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.8_ia64.deb
      Size/MD5 checksum:   295958 dcf1b145b868414bd2357d21ace70fb2
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.8_ia64.deb
      Size/MD5 checksum:  1605554 7ab0f7944f25bbaca6266e3bce816132
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.8_ia64.deb
      Size/MD5 checksum:  2132552 7324f4a81b5496cc7c9182ae2bb082fb
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.8_ia64.deb
      Size/MD5 checksum:   273506 fa943563a08e04b06c0632afe7f4bc92

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8_m68k.deb
      Size/MD5 checksum:  1466154 1f5c2b36763032352c2b45144517a5b8
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.8_m68k.deb
      Size/MD5 checksum:   159998 624ebcd80f960f7227095411cbdfb90c
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.8_m68k.deb
      Size/MD5 checksum:   210680 91b3bafec7f54823cb2720966fcc4825
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.8_m68k.deb
      Size/MD5 checksum:  1073256 b7f77626db0631d990422a3cae43f517
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.8_m68k.deb
      Size/MD5 checksum:  1288834 fd7af651e4d2d5124b45228d30dc6737
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.8_m68k.deb
      Size/MD5 checksum:   226942 f097f5c845a1159029271cba7112141f

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8_mips.deb
      Size/MD5 checksum:  1490232 6aff49b4b30fc146abde3fcbefe85d5f
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.8_mips.deb
      Size/MD5 checksum:   155500 416074125be015d5c49a90ac032c5182
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.8_mips.deb
      Size/MD5 checksum:   254800 b8f762578afa79b0210dec43547917a4
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.8_mips.deb
      Size/MD5 checksum:  1119320 6c778533f22c4f7e7c1dd268b5b59c3a
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.8_mips.deb
      Size/MD5 checksum:  1704446 6855a0354042ab9b283bc3966f4f665f
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.8_mips.deb
      Size/MD5 checksum:   131304 74185bb1115a3bcd50085df4fac2e50f

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8_mipsel.deb
      Size/MD5 checksum:  1490202 bd3a8c344eb9927d656543c20d784f38
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.8_mipsel.deb
      Size/MD5 checksum:   151598 d903083280a2428e35516444c93c7d03
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.8_mipsel.deb
      Size/MD5 checksum:   250056 7c7c6a65f433eee855e775b2e4eafcf3
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.8_mipsel.deb
      Size/MD5 checksum:  1114750 13012fdd898b1aa77267f90b73563e50
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.8_mipsel.deb
      Size/MD5 checksum:  1667906 1aeb160d222b005e4103c715d964b0db
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.8_mipsel.deb
      Size/MD5 checksum:   130912 84b347ac516de3a89060c2e010a63cf0

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8_powerpc.deb
      Size/MD5 checksum:  1471774 5e218bb6d5e36cf50c80ebbf77a56abe
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.8_powerpc.deb
      Size/MD5 checksum:   156748 4564f4918218c6e6c60fe587fd25d118
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.8_powerpc.deb
      Size/MD5 checksum:   227722 5eba56a195be2aca1354fce454293a9f
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.8_powerpc.deb
      Size/MD5 checksum:  1169510 92e5f7ca8fdf727e3a88a48262219c8e
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.8_powerpc.deb
      Size/MD5 checksum:  1684852 dc528d0a8080493c028bfca9665dcca3
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.8_powerpc.deb
      Size/MD5 checksum:   270502 cc408c569b2ce9d03576b4bd9bcb0cb0

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8_s390.deb
      Size/MD5 checksum:  1467494 d1a9308491175f690a73f720caa7532b
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.8_s390.deb
      Size/MD5 checksum:   180486 6693ec2651a6f959a7f3f08efbeeea6f
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.8_s390.deb
      Size/MD5 checksum:   230182 93a55b0f22a8339b13e2816a970ca102
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.8_s390.deb
      Size/MD5 checksum:  1194334 e93c9333e1adc98bb7b99e6d2904d995
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.8_s390.deb
      Size/MD5 checksum:  1530886 db33e6bb01f6d927c02053f0cdd4bf89
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.8_s390.deb
      Size/MD5 checksum:   242114 51baccefbc53499f3514911521d76c76

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.8_sparc.deb
      Size/MD5 checksum:  1465694 d77c64a8e1c40678070a79011abcb8a5
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.8_sparc.deb
      Size/MD5 checksum:   161036 dadfff14cc51b0fb9561bf6469b61a3e
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.8_sparc.deb
      Size/MD5 checksum:   224332 c8ebb9dbff86871dc12e3d5ae275bc12
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.8_sparc.deb
      Size/MD5 checksum:  1249156 461cd22009434968fd4011481ce01044
    http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.8_sparc.deb
      Size/MD5 checksum:  1684366 00b473e9bf9e417a4f0bcff753ed727b
    http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.8_sparc.deb
      Size/MD5 checksum:   230898 020b71df283f6391f3a15415be45a375


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFYFEwXm3vHE4uyloRArXzAJ0YznPidHhiaFobF4vjb/1lmUUxLwCcDFt9
UuEPCaiPwXcaFELt0v+3GWA=
=Gh4l
- -----END PGP SIGNATURE-----



______________________________________________________________________________

NISCC values your feedback.

1. Which of the following most reflects the value of the briefing to you?
(Place an 'X' next to your choice)

Very useful:__ Useful:__ Not useful:__ 

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our briefings?


Thank you for your contribution.
______________________________________________________________________________

For additional information or assistance, please contact our help desk
by telephone.  You may send Not Protectively Marked information via
e-mail to uniras@xxxxxxxxxxxxx

Office hours:

Mon - Fri: 08:30 - 17:00 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

______________________________________________________________________________

UNIRAS wishes to acknowledge the contributions of Debian for the
information contained in this briefing.
______________________________________________________________________________

This notice contains information released by the original author.
Some of the information may have changed since it was released. If the
vulnerability affects you, it may be prudent to retrieve the advisory
from the site of the original source to ensure that you receive the most
current information concerning that problem.

Reference to any specific commercial product, process, or service by
trade name, trademark manufacturer, or otherwise, does not constitute or
imply its endorsement, recommendation, or favouring by UNIRAS or NISCC.
The views and opinions of authors expressed within this notice shall not
be used for advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall not be liable for any loss or damage whatsoever, arising from or
in connection with the usage of information contained within this
notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST) and has contacts with other international Incident Response
Teams (IRTs) in order to foster cooperation and coordination in incident
prevention, to prompt rapid reaction to incidents, and to promote
information sharing amongst its members and the community at large.
______________________________________________________________________________

<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRWHEr2l7oeQsXfKvEQJPOQCeKiIEV/2ZkXpUARZGHxFYnrjb9oIAoJR3
wtyM9Ag4wHQTd09GWQgUYIK4
=zVtc
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________