Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2006.0543 -- [Win][UNIX/Linux][RedHat] Moderate: gnupg security update 3 August 2006 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: GnuPG versions 1.4.4 and prior Publisher: Red Hat Operating System: Red Hat Enterprise Linux AS/ES/WS 4 Red Hat Enterprise Linux Desktop 4 Red Hat Enterprise Linux AS/ES/WS 3 Red Hat Desktop 3 Red Hat Enterprise Linux AS/ES/WS 2.1 Red Hat Linux Advanced Workstation 2.1 UNIX variants (UNIX, Linux, OSX) Windows Impact: Execute Arbitrary Code/Commands Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2006-3746 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2006-0615.html http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html Comment: This advisory references vulnerabilities in products which run on platforms other than Red Hat. It is recommended that administrators running GnuPG check for an updated version of the software for their operating system. From the GnuPG announcement (for the complete post, see the above URLs): "Fixed 2 more possible memory allocation attacks. They are similar to the problem we fixed with 1.4.4. This bug can easily be be exploted [sic] for a DoS; remote code execution is not entirely impossible." However, AusCERT is not aware of any public proof of concept code or active exploitation of this vulnerability. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: gnupg security update Advisory ID: RHSA-2006:0615-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0615.html Issue date: 2006-08-02 Updated on: 2006-08-02 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-3746 - - --------------------------------------------------------------------- 1. Summary: Updated GnuPG packages that fix a security issue is now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: GnuPG is a utility for encrypting data and creating digital signatures. An integer overflow flaw was found in GnuPG. An attacker could create a carefully crafted message packet with a large length that could cause GnuPG to crash or possibly overwrite memory when opened. (CVE-2006-3746) All users of GnuPG are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 200502 - CVE-2006-3746 GnuPG Parse_Comment Remote Buffer Overflow 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/gnupg-1.0.7-18.src.rpm 7b3112bfc84dafe30c00070c8cb09700 gnupg-1.0.7-18.src.rpm i386: 958a64d9ec82066ab08da445199f6e75 gnupg-1.0.7-18.i386.rpm ia64: 0eae4ff0de57c02ed733997444eaf7bc gnupg-1.0.7-18.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/gnupg-1.0.7-18.src.rpm 7b3112bfc84dafe30c00070c8cb09700 gnupg-1.0.7-18.src.rpm ia64: 0eae4ff0de57c02ed733997444eaf7bc gnupg-1.0.7-18.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/gnupg-1.0.7-18.src.rpm 7b3112bfc84dafe30c00070c8cb09700 gnupg-1.0.7-18.src.rpm i386: 958a64d9ec82066ab08da445199f6e75 gnupg-1.0.7-18.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/gnupg-1.0.7-18.src.rpm 7b3112bfc84dafe30c00070c8cb09700 gnupg-1.0.7-18.src.rpm i386: 958a64d9ec82066ab08da445199f6e75 gnupg-1.0.7-18.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/gnupg-1.2.1-17.src.rpm 698a43061ce89f27bcd46eabd6f51230 gnupg-1.2.1-17.src.rpm i386: 65fee1a3a471eb6c8e214ccef7bfe3fe gnupg-1.2.1-17.i386.rpm bf6baa7dc4770b8888cc72076e3b4e90 gnupg-debuginfo-1.2.1-17.i386.rpm ia64: c1191a75f9ae45290f1c4524f2496a6c gnupg-1.2.1-17.ia64.rpm c010ba3562713a56b6206f16a4414dbb gnupg-debuginfo-1.2.1-17.ia64.rpm ppc: ce9d270a17b85a449bd6edc71ca6e10b gnupg-1.2.1-17.ppc.rpm c4913dbb57e4c66d788420f3cb0a0382 gnupg-debuginfo-1.2.1-17.ppc.rpm s390: 580852ff5bbef0d3a7c24abca0e3610c gnupg-1.2.1-17.s390.rpm 7583e08411dc1ab071a011a131331250 gnupg-debuginfo-1.2.1-17.s390.rpm s390x: e9d583a9471b453ce627e84dca5a9ccc gnupg-1.2.1-17.s390x.rpm 1a976fb4dc5cb4f5a5fee40e4e258b0a gnupg-debuginfo-1.2.1-17.s390x.rpm x86_64: 258bae860c6fb917cf800fd3c1a18478 gnupg-1.2.1-17.x86_64.rpm fe7381706fbf8de0796e40d63a3ea7f5 gnupg-debuginfo-1.2.1-17.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/gnupg-1.2.1-17.src.rpm 698a43061ce89f27bcd46eabd6f51230 gnupg-1.2.1-17.src.rpm i386: 65fee1a3a471eb6c8e214ccef7bfe3fe gnupg-1.2.1-17.i386.rpm bf6baa7dc4770b8888cc72076e3b4e90 gnupg-debuginfo-1.2.1-17.i386.rpm x86_64: 258bae860c6fb917cf800fd3c1a18478 gnupg-1.2.1-17.x86_64.rpm fe7381706fbf8de0796e40d63a3ea7f5 gnupg-debuginfo-1.2.1-17.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/gnupg-1.2.1-17.src.rpm 698a43061ce89f27bcd46eabd6f51230 gnupg-1.2.1-17.src.rpm i386: 65fee1a3a471eb6c8e214ccef7bfe3fe gnupg-1.2.1-17.i386.rpm bf6baa7dc4770b8888cc72076e3b4e90 gnupg-debuginfo-1.2.1-17.i386.rpm ia64: c1191a75f9ae45290f1c4524f2496a6c gnupg-1.2.1-17.ia64.rpm c010ba3562713a56b6206f16a4414dbb gnupg-debuginfo-1.2.1-17.ia64.rpm x86_64: 258bae860c6fb917cf800fd3c1a18478 gnupg-1.2.1-17.x86_64.rpm fe7381706fbf8de0796e40d63a3ea7f5 gnupg-debuginfo-1.2.1-17.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/gnupg-1.2.1-17.src.rpm 698a43061ce89f27bcd46eabd6f51230 gnupg-1.2.1-17.src.rpm i386: 65fee1a3a471eb6c8e214ccef7bfe3fe gnupg-1.2.1-17.i386.rpm bf6baa7dc4770b8888cc72076e3b4e90 gnupg-debuginfo-1.2.1-17.i386.rpm ia64: c1191a75f9ae45290f1c4524f2496a6c gnupg-1.2.1-17.ia64.rpm c010ba3562713a56b6206f16a4414dbb gnupg-debuginfo-1.2.1-17.ia64.rpm x86_64: 258bae860c6fb917cf800fd3c1a18478 gnupg-1.2.1-17.x86_64.rpm fe7381706fbf8de0796e40d63a3ea7f5 gnupg-debuginfo-1.2.1-17.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gnupg-1.2.6-6.src.rpm 55db2b04516f48422fe35be762cfbe80 gnupg-1.2.6-6.src.rpm i386: 41a2ad79f2fe8507b66405400735211a gnupg-1.2.6-6.i386.rpm 1770ee4a1c053b67abf3786d9d9ba439 gnupg-debuginfo-1.2.6-6.i386.rpm ia64: bd78ca4648898a9d78ac79fc81a0b604 gnupg-1.2.6-6.ia64.rpm de3ee6ff3e0d5d2af24bf35a98616ee6 gnupg-debuginfo-1.2.6-6.ia64.rpm ppc: 8aa392d26563d4b4654e7a379503614a gnupg-1.2.6-6.ppc.rpm 49a168e70b1207bcf611cb78fb652709 gnupg-debuginfo-1.2.6-6.ppc.rpm s390: db61ab7f02568b32b6cc898f09f02276 gnupg-1.2.6-6.s390.rpm 5955670bfc5e3c30d6f4fb66ea230430 gnupg-debuginfo-1.2.6-6.s390.rpm s390x: cc2f486af4a032b4aa8663f2b66f5dcd gnupg-1.2.6-6.s390x.rpm a1c0388758e97ba28a24e885acb9e498 gnupg-debuginfo-1.2.6-6.s390x.rpm x86_64: 2df9a26aa1f740d903a223973d815306 gnupg-1.2.6-6.x86_64.rpm f97142aaca22b2f64c89b0c9bcf1d535 gnupg-debuginfo-1.2.6-6.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gnupg-1.2.6-6.src.rpm 55db2b04516f48422fe35be762cfbe80 gnupg-1.2.6-6.src.rpm i386: 41a2ad79f2fe8507b66405400735211a gnupg-1.2.6-6.i386.rpm 1770ee4a1c053b67abf3786d9d9ba439 gnupg-debuginfo-1.2.6-6.i386.rpm x86_64: 2df9a26aa1f740d903a223973d815306 gnupg-1.2.6-6.x86_64.rpm f97142aaca22b2f64c89b0c9bcf1d535 gnupg-debuginfo-1.2.6-6.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gnupg-1.2.6-6.src.rpm 55db2b04516f48422fe35be762cfbe80 gnupg-1.2.6-6.src.rpm i386: 41a2ad79f2fe8507b66405400735211a gnupg-1.2.6-6.i386.rpm 1770ee4a1c053b67abf3786d9d9ba439 gnupg-debuginfo-1.2.6-6.i386.rpm ia64: bd78ca4648898a9d78ac79fc81a0b604 gnupg-1.2.6-6.ia64.rpm de3ee6ff3e0d5d2af24bf35a98616ee6 gnupg-debuginfo-1.2.6-6.ia64.rpm x86_64: 2df9a26aa1f740d903a223973d815306 gnupg-1.2.6-6.x86_64.rpm f97142aaca22b2f64c89b0c9bcf1d535 gnupg-debuginfo-1.2.6-6.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gnupg-1.2.6-6.src.rpm 55db2b04516f48422fe35be762cfbe80 gnupg-1.2.6-6.src.rpm i386: 41a2ad79f2fe8507b66405400735211a gnupg-1.2.6-6.i386.rpm 1770ee4a1c053b67abf3786d9d9ba439 gnupg-debuginfo-1.2.6-6.i386.rpm ia64: bd78ca4648898a9d78ac79fc81a0b604 gnupg-1.2.6-6.ia64.rpm de3ee6ff3e0d5d2af24bf35a98616ee6 gnupg-debuginfo-1.2.6-6.ia64.rpm x86_64: 2df9a26aa1f740d903a223973d815306 gnupg-1.2.6-6.x86_64.rpm f97142aaca22b2f64c89b0c9bcf1d535 gnupg-debuginfo-1.2.6-6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3746 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFE0IBfXlSAg2UNWIIRAsDKAJ41oNJeLBDft0IQOJwC6kWRml229ACgplpG nomjA47cAVu/zCLzpyWrsrU= =kjbk - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRNF29yh9+71yA2DNAQKhNAP+MTaOm4Mn8F/t8EXeWLyAXx+c42hBn60d GVM6apdsiJjvnRKxpleNl7BD+uWE7u+Ikml5N3xKliZIGzdP+iKucfkXyMPwK9JY MSXRA+Jc4hrXLNHCS76SZJfpjPmUbHoffdlIhWvoikUSz+lF6dxh+9Xfhmfx77bH sb9jSdQX+Vs= =QDcs -----END PGP SIGNATURE-----