Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2006.0943 -- [Win][UNIX/Linux] Updated mono packages fix vulnerability 22 December 2006 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Mono, XSP, 2.0 Mono, XSP, 1.2.1 Mono, XSP, 1.1 Publisher: Mandriva Operating System: Mac OS X Linux variants Solaris Windows Impact: Read-only Data Access Access: Remote/Unauthenticated CVE Names: CVE-2006-6104 Original Bulletin: http://www.mandriva.com/security/advisories?name=MDKSA-2006:234 http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html Comment: This advisory references vulnerabilities in products which run on platforms other than Mandriva. It is recommended that administrators running mono check for an updated version of the software for their operating system from: http://www.mono-project.com/Downloads - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2006:234 http://www.mandriva.com/security/ _______________________________________________________________________ Package : mono Date : December 20, 2006 Affected: 2007.0 _______________________________________________________________________ Problem Description: XSP (the Mono ASP.NET server) is vulnerable to source disclosure attack which allow a malicious user to obtain the source code of the server-side application. This vulnerability grants the attacker deeper knowledge of the Web application logic. Updated packages have been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6104 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.0: 372cd7944c4ae044529132a60a0f4cba 2007.0/i586/jay-1.1.17.1-5.2mdv2007.0.i586.rpm 57586c9c8baff2fbe3c59c3529adc5a7 2007.0/i586/libmono-runtime-1.1.17.1-5.2mdv2007.0.i586.rpm 1cf0dcab116f59634f3890fab1cb46eb 2007.0/i586/libmono0-1.1.17.1-5.2mdv2007.0.i586.rpm 1898e4fc4e6f1c671c37a8d76814a89f 2007.0/i586/libmono0-devel-1.1.17.1-5.2mdv2007.0.i586.rpm 7dca6df31b2cac25df9d1568136ab8b3 2007.0/i586/mono-1.1.17.1-5.2mdv2007.0.i586.rpm cb7c8cd1f5db165f31ea7e139d60fc75 2007.0/i586/mono-data-sqlite-1.1.17.1-5.2mdv2007.0.i586.rpm 73cfb46d15b9b0588f4013781d40a114 2007.0/i586/mono-doc-1.1.17.1-5.2mdv2007.0.i586.rpm ddc633435f442f9436caec01d9796830 2007.0/SRPMS/mono-1.1.17.1-5.2mdv2007.0.src.rpm Mandriva Linux 2007.0/X86_64: 2b54bfd1164dd9c935b9af5c3297e90a 2007.0/x86_64/jay-1.1.17.1-5.2mdv2007.0.x86_64.rpm 6b137c021b3596699b22af6a8ef919fc 2007.0/x86_64/lib64mono0-1.1.17.1-5.2mdv2007.0.x86_64.rpm 8825990b27f3c66c2e225d483290b41d 2007.0/x86_64/lib64mono0-devel-1.1.17.1-5.2mdv2007.0.x86_64.rpm a58792e500afc0a1f231a46ba7c8cf96 2007.0/x86_64/libmono-runtime-1.1.17.1-5.2mdv2007.0.x86_64.rpm 6030ac6e852551dea3f36dc2ab54ecb2 2007.0/x86_64/mono-1.1.17.1-5.2mdv2007.0.x86_64.rpm baec0fa42850f91bb089317f62e5722c 2007.0/x86_64/mono-data-sqlite-1.1.17.1-5.2mdv2007.0.x86_64.rpm 72d633232728911fc9fa428ab3af582f 2007.0/x86_64/mono-doc-1.1.17.1-5.2mdv2007.0.x86_64.rpm ddc633435f442f9436caec01d9796830 2007.0/SRPMS/mono-1.1.17.1-5.2mdv2007.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFiX+7mqjQ0CJFipgRAoaWAKCaYYK+vmPWKIsmFyVX3VXw9fEw+gCePcyJ X3utvyAnG5Kd3sKqxKy2y7Q= =3vlL - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRYsqEih9+71yA2DNAQLilwP9F+1Sj/aBCJseCaUeciNZH6sQjTHhJPc3 8QoVDO165w/vpmB9EZ2FoyPAOsrJwCeC59LMmewgfu+UBNqxOe7f0gXkzrKfhmH3 OH7mIjk+Qk61FSw0QA8xVeSXXd7xSQ06WIn81BserskD2qgsGqlHKszYTf6FdMLP WbldIQ6Qiik= =+05Z -----END PGP SIGNATURE-----