Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2005.0980 -- [Debian] New ethereal packages fix arbitrary code execution 14 December 2005 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ethereal Publisher: Debian Operating System: Debian GNU/Linux 3.1 Debian GNU/Linux 3.0 Impact: Execute Arbitrary Code/Commands Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2005-3651 Ref: ESB-2005.0976 Original Bulletin: http://www.debian.org/security/2005/dsa-920 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 920-1 security@debian.org http://www.debian.org/security/ Martin Schulze December 13th, 2005 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : ethereal Vulnerability : buffer overflow Problem type : remote Debian-specific: no CVE ID : CVE-2005-3651 BugTraq ID : 15794 Debian Bug : 342911 A buffer overflow has been discovered in ethereal, a commonly used network traffic analyser that causes a denial of service and may potentially allow the execution of arbitrary code. For the old stable distribution (woody) this problem has been fixed in version 0.9.4-1woody14. For the stable distribution (sarge) this problem has been fixed in version 0.10.10-2sarge3. For the unstable distribution (sid) this problem will be fixed soon. We recommend that you upgrade your ethereal packages. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14.dsc Size/MD5 checksum: 681 fd2549fde25a12ea89ff76f16f476a1b http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14.diff.gz Size/MD5 checksum: 46176 b28a169806ac6c7357bc59cb684ce067 http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4.orig.tar.gz Size/MD5 checksum: 3278908 42e999daa659820ee93aaaa39ea1e9ea Alpha architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14_alpha.deb Size/MD5 checksum: 1941098 7ea04145418237e513e15021dc7f7b95 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody14_alpha.deb Size/MD5 checksum: 334948 cef7bebe414cbf9d7ba06dded593e087 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody14_alpha.deb Size/MD5 checksum: 223218 648d49081514871e244690c8d5f33691 http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody14_alpha.deb Size/MD5 checksum: 1708326 42b0e3d2014feb624df9b899ff620a0b ARM architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14_arm.deb Size/MD5 checksum: 1635960 b04119f7705cf79e7172f1d18948fa8d http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody14_arm.deb Size/MD5 checksum: 298554 3fd358c7da7eb738eb6873ef7af66d7f http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody14_arm.deb Size/MD5 checksum: 207122 45c7b2fd84a7eb3e36e8d69ea9b6dcdf http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody14_arm.deb Size/MD5 checksum: 1440018 9e3b3a723071fbd018ad3ac73183da68 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14_i386.deb Size/MD5 checksum: 1513538 b953ab41e1961c68629b925bbc56dd83 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody14_i386.deb Size/MD5 checksum: 287406 5ef238518e168e5a46319493c15c4e19 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody14_i386.deb Size/MD5 checksum: 199112 56c7fb6de85158b326b90488a0752cb1 http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody14_i386.deb Size/MD5 checksum: 1327200 3efaf5307fd7d6f34814e155caa33a7a Intel IA-64 architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14_ia64.deb Size/MD5 checksum: 2150464 14f206f1245e654828dc70458d7b6ec6 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody14_ia64.deb Size/MD5 checksum: 373888 3e18fd820eaef70e178e1e54f35b163b http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody14_ia64.deb Size/MD5 checksum: 234768 0e01b34d747883840309fbe0a82b9d90 http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody14_ia64.deb Size/MD5 checksum: 1862118 759d0b8533a34f25e2cd44e77b22b4c8 HP Precision architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14_hppa.deb Size/MD5 checksum: 1805078 e84cbe1d3502ddaf4d34e3a969a14736 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody14_hppa.deb Size/MD5 checksum: 323354 37c86ac01668a204d7808a9fdcbb81be http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody14_hppa.deb Size/MD5 checksum: 217748 a9a0acb50c691d7bc451cfae45c9d51e http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody14_hppa.deb Size/MD5 checksum: 1576466 8c1be59eac51ed8a610285a15a058e22 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14_m68k.deb Size/MD5 checksum: 1425116 544e1f11c2d772762396cf4d50cc93b8 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody14_m68k.deb Size/MD5 checksum: 283738 77f3c1a0ee662058b9e55cafe1d1ae7c http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody14_m68k.deb Size/MD5 checksum: 196008 b0dfb3b8d3d1e37c6a077930ea3dbf3b http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody14_m68k.deb Size/MD5 checksum: 1249126 60a2d75460899934f40c2ea649c7bf7d Big endian MIPS architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14_mips.deb Size/MD5 checksum: 1617300 8538bf50fd13015ec371a625f8eaeae7 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody14_mips.deb Size/MD5 checksum: 306118 7efffa6fb386ddda82d2669ffc575db4 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody14_mips.deb Size/MD5 checksum: 214658 189f2f3621ebde6a7455bc2be6e09c3e http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody14_mips.deb Size/MD5 checksum: 1422282 9b066162a09a3c53d82f5c9463fe239b Little endian MIPS architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14_mipsel.deb Size/MD5 checksum: 1598586 6ed002e3b9d37f57b3cb782270ae26cb http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody14_mipsel.deb Size/MD5 checksum: 305606 557d7ecf335f4f60f57e6e2483a81888 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody14_mipsel.deb Size/MD5 checksum: 214304 cd62dba02317002a5d78472b18c9603b http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody14_mipsel.deb Size/MD5 checksum: 1406756 b106a0b8c8ab20d663c342367a556a5e PowerPC architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14_powerpc.deb Size/MD5 checksum: 1618532 c41f2a97a6853433772f5f2a0c8e32de http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody14_powerpc.deb Size/MD5 checksum: 302842 245c32c2385672854ea654206a6a0db7 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody14_powerpc.deb Size/MD5 checksum: 209956 8336298c3c08e4213c617f4fb9922dcf http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody14_powerpc.deb Size/MD5 checksum: 1419734 1bd2b78f8a25b9da6f70c3f05b580be3 IBM S/390 architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14_s390.deb Size/MD5 checksum: 1575174 54dc9af554d9b748a1e3ff7d9e805f1a http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody14_s390.deb Size/MD5 checksum: 301632 dedef85bb14b6b45f92085f90314034d http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody14_s390.deb Size/MD5 checksum: 205000 b6200c4c1f9015261a7ac43ac6c43252 http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody14_s390.deb Size/MD5 checksum: 1388014 45b14ef2e45ab75949227acc26878b6b Sun Sparc architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody14_sparc.deb Size/MD5 checksum: 1583708 acfac4316a7e5a71158bb25af5689293 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody14_sparc.deb Size/MD5 checksum: 318896 aca734b7ec2a1d7f631159b568b8b999 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody14_sparc.deb Size/MD5 checksum: 205782 2a5a107881b218d3adf4662578a1a108 http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody14_sparc.deb Size/MD5 checksum: 1389940 7b383ffec5230f7766935089fcff0e0e Debian GNU/Linux 3.1 alias sarge - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4.dsc Size/MD5 checksum: 855 29cbef6699e9e51ae35c4745b978c1e4 http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4.diff.gz Size/MD5 checksum: 167246 2230337a164906c33ca978abc5b57c65 http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10.orig.tar.gz Size/MD5 checksum: 7411510 e6b74468412c17bb66cd459bfb61471c Alpha architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4_alpha.deb Size/MD5 checksum: 541818 a6c44210b359d74ed16ed23fe386759d http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge4_alpha.deb Size/MD5 checksum: 5474866 5924bfdf784578df4dd2df46392d2a0c http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge4_alpha.deb Size/MD5 checksum: 153864 e687ab4c0c2dec8d62065d18484fadce http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge4_alpha.deb Size/MD5 checksum: 105162 431908b433045153e7360c53bde3e900 AMD64 architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4_amd64.deb Size/MD5 checksum: 485392 16a454068f8ce4997d7df6808d66b64b http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge4_amd64.deb Size/MD5 checksum: 5334066 79eeb45de736a575fcbfdc7e40fd0083 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge4_amd64.deb Size/MD5 checksum: 153864 980cd2da44c4d1bc32ae6336acb2c79f http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge4_amd64.deb Size/MD5 checksum: 98444 08817a1f964ab391ffec8da425020572 ARM architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4_arm.deb Size/MD5 checksum: 471758 37774606d0d4d050dece6b73907a9885 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge4_arm.deb Size/MD5 checksum: 4685936 54446e011296caf441369bab0bd7aecd http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge4_arm.deb Size/MD5 checksum: 153890 00002cca682ca3c3abf2e7c97e41e841 http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge4_arm.deb Size/MD5 checksum: 94388 ddf5908a309c89acadac3962dec222c3 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4_i386.deb Size/MD5 checksum: 442462 22585d584a56ade669ef45e23a460c13 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge4_i386.deb Size/MD5 checksum: 4491616 db1efd0f3a3f9e5ac03f82f56d435048 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge4_i386.deb Size/MD5 checksum: 153658 f754988305495aa0babd2ffc6c05dfb7 http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge4_i386.deb Size/MD5 checksum: 89874 7f9b4b8731d3b7cc770d1e81fdf9edff Intel IA-64 architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4_ia64.deb Size/MD5 checksum: 673480 2accbfffd291f3b424d0f0203bfeaf95 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge4_ia64.deb Size/MD5 checksum: 6625668 951a0d38bf3f2ff63fabb3aeed861719 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge4_ia64.deb Size/MD5 checksum: 153864 151d53ada1dcc87f45bd5c9eac830a8b http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge4_ia64.deb Size/MD5 checksum: 128148 5b970496851ecc3c8034c4a6050d39d9 HP Precision architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4_hppa.deb Size/MD5 checksum: 488198 16e109738a8788eff83b2a94426bc90d http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge4_hppa.deb Size/MD5 checksum: 5785972 915abaae95c1620129d982b4f742e998 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge4_hppa.deb Size/MD5 checksum: 153880 deb9a9396bc7e6b9e4a9c98a3b0997be http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge4_hppa.deb Size/MD5 checksum: 97420 4d15ca9df16e677ec167e918d1df3262 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4_m68k.deb Size/MD5 checksum: 446824 a24b34013583a4e3497a1ebf6142ff22 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge4_m68k.deb Size/MD5 checksum: 5564090 ec403a6ef8f92839ec3e48c031f427be http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge4_m68k.deb Size/MD5 checksum: 153992 388cce8ba0ecddede0d2a0eb7b41f976 http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge4_m68k.deb Size/MD5 checksum: 89958 de2aa186345897a64577ed6991de0f16 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4_mips.deb Size/MD5 checksum: 461508 944dbf1184d71f3420aa0e0f998e4951 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge4_mips.deb Size/MD5 checksum: 4722696 7ecb7db0539d885c010141d2307d2309 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge4_mips.deb Size/MD5 checksum: 153882 b4ffbc14b75db5a2d80ea8ab2dc098d9 http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge4_mips.deb Size/MD5 checksum: 93670 edfbeb906903497b741ce491d062fe8d Little endian MIPS architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4_mipsel.deb Size/MD5 checksum: 456796 61db19e60b59ca08539139f133161ecd http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge4_mipsel.deb Size/MD5 checksum: 4458954 3f85051d87e652474f35c93df894668d http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge4_mipsel.deb Size/MD5 checksum: 153896 6b4fa165eb5fc6c85ea5443f9cc8627c http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge4_mipsel.deb Size/MD5 checksum: 93596 f3fbc2765b9eef5589ae8b67b3fc507b PowerPC architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4_powerpc.deb Size/MD5 checksum: 454624 ac160f2dfaf9480ec2ddb284b16969b2 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge4_powerpc.deb Size/MD5 checksum: 5069322 b505bbd6c34a9fc83d3ab34161751b89 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge4_powerpc.deb Size/MD5 checksum: 153888 0ac314e84694a76fd5475f8318c0bd0c http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge4_powerpc.deb Size/MD5 checksum: 93460 89763605c5fc59034a6b3b4399920a51 IBM S/390 architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4_s390.deb Size/MD5 checksum: 478832 f58c4f3e2f5f185cb40818aad6bcba76 http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge4_s390.deb Size/MD5 checksum: 5620232 a8ad7eceaa81bbacbd70a3f4d2201edf http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge4_s390.deb Size/MD5 checksum: 153878 837cf0ef9571ee6abdeb382d54412d90 http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge4_s390.deb Size/MD5 checksum: 98982 e5bad7bb8bf3964b47b41ec84b62e342 Sun Sparc architecture: http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge4_sparc.deb Size/MD5 checksum: 464160 3e21acc4249b2032b1d7ed474486189e http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge4_sparc.deb Size/MD5 checksum: 5127616 f418acff6a83220d1b3ba544856b60ed http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge4_sparc.deb Size/MD5 checksum: 153870 e45257dbd6a4799b26be761fcc79e835 http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge4_sparc.deb Size/MD5 checksum: 92840 aa61f8545872884a69df77aa3a8e35d6 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDnrrHW5ql+IAeqTIRAuDBAJ9+6Ablhq7itE0PpFPhF7yEToauXwCdGb8B aQX5QDtvXo6ILXx8K38wlnM= =P8ZB - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQ59yuih9+71yA2DNAQIlBgP/X7WBL69NTAsl6ri+YL3wbeBaDQBkL69i WBg7fgMlFwNG7Z4piiq92twJp+20IQ941GrK0c0K0vn4MTyt/SeRjL84za3M5UJS 9xayWnIhPdvfrdWx5cqqKu2AQ+1wyT9Hn8EK3rgz5KUTw31MWbjIzAdhteAY7aQX 8LJuqrdxCCY= =Iua/ -----END PGP SIGNATURE-----