Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2001.286 -- Macromedia Product Security Bulletin (MPSB01-07) ColdFusion Server security issues 12 July 2001 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ColdFusion Server 2.x ColdFusion Server 3.x ColdFusion Server 4.x Vendor: Macromedia Allaire Operating System: Windows Solaris Linux HP-UX Impact: Access Privileged Data Modify Arbitrary Files Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- Macromedia Product Security Bulletin (MPSB01-07) Macromedia releases patch that addresses ColdFusion Server security issues. Originally Posted: July 11, 2001 Summary Macromedia has released a patch that addresses two ColdFusion Server security issues which affect all server versions from 2.0 through 4.5.1 SP2 (all editions). The security issues were discovered through a routine internal security audit. The security issues potentially expose read and delete access to files on machines running ColdFusion Server as well as overwriting ColdFusion Server templates with zero byte files. Customers are strongly encouraged to upgrade their servers to ColdFusion Server 5 or install the patch as soon as possible. The security issues DO NOT affect ColdFusion Server 5. Issue As part of a routine internal security audit of ColdFusion Server, Macromedia discovered two potential security issues. One issue could allow unauthorized read and delete access to files on a machine running ColdFusion Server. The other issue could allow ColdFusion Server templates to be overwritten with a zero byte file of the same name. The issues affect ColdFusion Server versions 2.0 through 4.5.1 SP2 (all editions). The security issues DO NOT affect ColdFusion Server 5. Macromedia has released a patch that addresses the issues on the versions listed below. The patch has been thoroughly tested for stability. Customers should expect a 3 - 8% performance degradation as a result of installing the patch. Macromedia strongly recommends that customers install the patch on all production servers or upgrade to ColdFusion Server 5. Affected Software Versions ColdFusion Server 2.x, 3.x, 4.x What Macromedia Is Doing Macromedia has notified customers of the security issues through standard communication channels and released a patch that addresses the issues. The patch is now available for download for the following server versions: 3.1.1, 4.0, 4.0.1, 4.5, 4.5.1, 4.5.1 SP1, 4.5.1 SP2. The patches apply to both English language and localized editions (French, German, and Japanese). Download - MPSB01-07 ColdFusion Security Patch (Windows Editions) http://a725.g.akamai.net/7/725/3564/v002/download.macromedia.com/publicdl/update/en/coldfusion/45/CFMPSB0107Windows.exe Download - MPSB01-07 ColdFusion Security Patch (Solaris Editions) http://a725.g.akamai.net/7/725/3564/v002/download.macromedia.com/publicdl/update/en/coldfusion/45/CFMPSB0107Solaris.tar.gz Download - MPSB01-07 ColdFusion Security Patch (Linux Editions) http://a725.g.akamai.net/7/725/3564/v002/download.macromedia.com/publicdl/update/en/coldfusion/45/CFMPSB0107Linux.tar.gz Download - MPSB01-07 ColdFusion Security Patch (HP-UX Editions) http://a725.g.akamai.net/7/725/3564/v002/download.macromedia.com/publicdl/update/en/coldfusion/45/CFMPSB0107HPUX.tar.gz To install this patch for Windows, download and run the executable file. NOTE: Customers patching ColdFusion 4.x, who are using MS IIS first need to install the MSVCRT 6.0 runtime libraries, available here. To install this patch for Solaris, Linux or HP-UX, download the appropriate file, and review the readme.txt file before installing. Click here to access a more detailed FAQ Customers running ColdFusion Server versions 2.0 or 3.0 are strongly encouraged to upgrade their servers to a more recent release. No patch will be made available for versions 2.0 or 3.0. Customers running Versions 3.1.1, 4.0, 4.0.1, 4.5, 4.5.1, 4.5.1 SP1, or 4.5.1 SP2, are strongly encouraged to install the patch immediately on all production servers. (Note: Macromedia's standard support policy is one release back. But for these particular issues, Macromedia has released patches three releases back. To stay current with the latest features, enhancements, and updates, customers are encouraged to move to the most recent release of the server.) Revisions July 11, 2001 - Bulletin first released. Reporting Security Issues Macromedia is committed to addressing security issues and providing customers with the information on how they can protect themselves. If you identify what you believe may be a security issue with a Macromedia product, please send an email to email@example.com. We will work to appropriately address and communicate the issue. Receiving Security Bulletins When Macromedia becomes aware of a security issue that we believe significantly affects our products or customers, we will notify customers when appropriate. Typically this notification will be in the form of a security bulletin explaining the issue and the response. Macromedia customers who would like to receive notification of new security bulletins when they are released can sign up for our security notification service. For additional information on security issues at Macromedia, please visit: http://www.allaire.com/security. THE INFORMATION PROVIDED BY MACROMEDIA IN THIS BULLETIN IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MACROMEDIA AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, WHETHER EXPRESS OR IMPLIED OR OTHERWISE, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ALSO, THERE IS NO WARRANTY OF NON-INFRINGEMENT, TITLE OR QUIET ENJOYMENT. (USA ONLY) SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. IN NO EVENT SHALL MACROMEDIA, INC. OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING, WITHOUT LIMITATION, DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL, PUNITIVE, COVER, LOSS OF PROFITS, BUSINESS INTERRUPTION OR THE LIKE, OR LOSS OF BUSINESS DAMAGES, BASED ON ANY THEORY OF LIABILITY INCLUDING BREACH OF CONTRACT, BREACH OF WARRANTY, TORT(INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR OTHERWISE, EVEN IF MACROMEDIA, INC. OR ITS SUPPLIERS OR THEIR REPRESENTATIVES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. (USA ONLY) SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, SO THE ABOVE EXCLUSION OR LIMITATION MAY NOT APPLY TO YOU AND YOU MAY ALSO HAVE OTHER LEGAL RIGHTS THAT VARY FROM STATE TO STATE. Macromedia reserves the right, from time to time, to update the information in this document with current information. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to firstname.lastname@example.org and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: email@example.com Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBO03C7Sh9+71yA2DNAQFuLQP+LVzzE71lNClM1MaMvIJ0lTFlg5R8QG8h e/UjYSD2i+wYyUDkFkDUaW38oeb0jm1ub4MMQsS4eArEKnL1nDZbylgCplzVc0G6 VFzaSftswCygpmzA/MMHdDVtva2HPAR5VESzj7B+uw8G1KvIY4BNQST4RH8V+eSI sI3MPe36btg= =q2ac -----END PGP SIGNATURE-----