-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2012.0021
                          Announcing NetBSD 5.1.2
                             13 February 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              NetBSD
Operating System:     NetBSD
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                      Access Privileged Data          -- Remote/Unauthenticated      
                      Denial of Service               -- Remote/Unauthenticated      
                      Provide Misleading Information  -- Remote with User Interaction
                      Access Confidential Data        -- Remote/Unauthenticated      
                      Unauthorised Access             -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2012-0814 CVE-2012-0050 CVE-2011-4576
                      CVE-2011-4109 CVE-2011-0996 CVE-2011-0465
                      CVE-2011-0411 CVE-2010-4180 
Member content until: Wednesday, March 14 2012
Reference:            ESB-2010.1126
                      ESB-2012.0074
                      ESB-2012.0027
                      ESB-2011.0273
                      ESB-2011.0448
                      ESB-2011.0392

OVERVIEW

        Multiple vulnerabilities have been fixed in NetBSD 5.1.2.


IMPACT

        The vendor has provided the following information about the fixes in
        5.1.2: [1]
        
        	* Fix a buffer overflow in libtelnet.
        	* OpenSSL: Fix CVE-2010-4180, CVE-2012-0050, CVE-2011-4109,
        	  and CVE-2011-4576.
        	* Postfix: Update to 2.6.9, fixing CVE-2011-0411.
        	* dhcpcd: Fix CVE-2011-0996.
        	* xrdb: Fix CVE-2011-0465.
        	* glob(3): Prevent resource DoS from brace expansion.
        	* OpenSSH: Fix CVE-2012-0814.


MITIGATION

        The vendor recommends updating to 5.1.2. [1]


REFERENCES

        [1] Announcing NetBSD 5.1.2
            http://www.netbsd.org/releases/formal-5/NetBSD-5.1.2.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=UKng
-----END PGP SIGNATURE-----