Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2007.0162 -- [RedHat] Low: wireshark security update 15 March 2007 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Wireshark Publisher: Red Hat Operating System: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 2 Impact: Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2007-0459 CVE-2007-0458 CVE-2007-0457 CVE-2007-0456 Ref: ESB-2007.0074 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2007-0066.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Low: wireshark security update Advisory ID: RHSA-2007:0066-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0066.html Issue date: 2007-03-14 Updated on: 2007-03-14 Product: Red Hat Enterprise Linux CVE Names: CVE-2007-0456 CVE-2007-0457 CVE-2007-0458 CVE-2007-0459 - - --------------------------------------------------------------------- 1. Summary: New Wireshark packages that fix various security vulnerabilities are now available. Wireshark was previously known as Ethereal. This update has been rated as having low security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Problem description: Wireshark is a program for monitoring network traffic. Several denial of service bugs were found in Wireshark's LLT, IEEE 802.11, http, and tcp protocol dissectors. It was possible for Wireshark to crash or stop responding if it read a malformed packet off the network. (CVE-2007-0456, CVE-2007-0457, CVE-2007-0458, CVE-2007-0459) Users of Wireshark should upgrade to these updated packages containing Wireshark version 0.99.5, which is not vulnerable to these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bug IDs fixed (http://bugzilla.redhat.com/): 225689 - CVE-2007-0456 Multiple Wireshark issues (CVE-2007-0457, CVE-2007-0458, CVE-2007-0459) 225781 - CVE-2007-0456 Multiple Wireshark issues (CVE-2007-0457, CVE-2007-0458, CVE-2007-0459) 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/wireshark-0.99.5-AS21.3.src.rpm 910c560ed0a96d5d421fdd4dc960e58b wireshark-0.99.5-AS21.3.src.rpm i386: b77cfcda3db81ff075eacc7f6b8da85d wireshark-0.99.5-AS21.3.i386.rpm 3ba3d22aba95c5738b35bce0ff61be23 wireshark-gnome-0.99.5-AS21.3.i386.rpm ia64: ec1c1946804e2bff049c49283c93e51b wireshark-0.99.5-AS21.3.ia64.rpm a38f01c33c7d7aaa2b297378384688b4 wireshark-gnome-0.99.5-AS21.3.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/wireshark-0.99.5-AS21.3.src.rpm 910c560ed0a96d5d421fdd4dc960e58b wireshark-0.99.5-AS21.3.src.rpm ia64: ec1c1946804e2bff049c49283c93e51b wireshark-0.99.5-AS21.3.ia64.rpm a38f01c33c7d7aaa2b297378384688b4 wireshark-gnome-0.99.5-AS21.3.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/wireshark-0.99.5-AS21.3.src.rpm 910c560ed0a96d5d421fdd4dc960e58b wireshark-0.99.5-AS21.3.src.rpm i386: b77cfcda3db81ff075eacc7f6b8da85d wireshark-0.99.5-AS21.3.i386.rpm 3ba3d22aba95c5738b35bce0ff61be23 wireshark-gnome-0.99.5-AS21.3.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/wireshark-0.99.5-AS21.3.src.rpm 910c560ed0a96d5d421fdd4dc960e58b wireshark-0.99.5-AS21.3.src.rpm i386: b77cfcda3db81ff075eacc7f6b8da85d wireshark-0.99.5-AS21.3.i386.rpm 3ba3d22aba95c5738b35bce0ff61be23 wireshark-gnome-0.99.5-AS21.3.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/wireshark-0.99.5-EL3.1.src.rpm c7255e4fa8af9ea9e6f8e1ee725e99e0 wireshark-0.99.5-EL3.1.src.rpm i386: 34ed0d94e523c71598f686e2cd1f12a7 wireshark-0.99.5-EL3.1.i386.rpm 5e1ab6abb2938fbb186b5931a73a657a wireshark-debuginfo-0.99.5-EL3.1.i386.rpm 51c2537226e42b98628130f8bd7c59ae wireshark-gnome-0.99.5-EL3.1.i386.rpm ia64: daf4a17f63e344828751e80281ebb877 wireshark-0.99.5-EL3.1.ia64.rpm 8cef63ff60d2c9a4e477708859710fff wireshark-debuginfo-0.99.5-EL3.1.ia64.rpm 3c80210a835d9daa2001a87b61bfa94f wireshark-gnome-0.99.5-EL3.1.ia64.rpm ppc: f227857529add11741a61af950c52a34 wireshark-0.99.5-EL3.1.ppc.rpm 64e566cd791dc45796d1f8941ef71853 wireshark-debuginfo-0.99.5-EL3.1.ppc.rpm 79016cc05e209507144f51fb39f91b79 wireshark-gnome-0.99.5-EL3.1.ppc.rpm s390: da432075e4346fced0060df567b55096 wireshark-0.99.5-EL3.1.s390.rpm d5660961fa9fd8379131623413eaf89d wireshark-debuginfo-0.99.5-EL3.1.s390.rpm ec4f0a3279698d6e470f64c829e0afcb wireshark-gnome-0.99.5-EL3.1.s390.rpm s390x: 97340db1628c7b88e87e3a55fe11fc31 wireshark-0.99.5-EL3.1.s390x.rpm d103f1089b8a4e1804c49917c75fd0b4 wireshark-debuginfo-0.99.5-EL3.1.s390x.rpm d222da5178b1398b758d8e15e3388fb8 wireshark-gnome-0.99.5-EL3.1.s390x.rpm x86_64: 9cb61c5d8b95d8f83be1625deac47149 wireshark-0.99.5-EL3.1.x86_64.rpm bfcabe9dd73a7e699ae74fab0839b801 wireshark-debuginfo-0.99.5-EL3.1.x86_64.rpm aad3f0b52b39619959761586c374821b wireshark-gnome-0.99.5-EL3.1.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/wireshark-0.99.5-EL3.1.src.rpm c7255e4fa8af9ea9e6f8e1ee725e99e0 wireshark-0.99.5-EL3.1.src.rpm i386: 34ed0d94e523c71598f686e2cd1f12a7 wireshark-0.99.5-EL3.1.i386.rpm 5e1ab6abb2938fbb186b5931a73a657a wireshark-debuginfo-0.99.5-EL3.1.i386.rpm 51c2537226e42b98628130f8bd7c59ae wireshark-gnome-0.99.5-EL3.1.i386.rpm x86_64: 9cb61c5d8b95d8f83be1625deac47149 wireshark-0.99.5-EL3.1.x86_64.rpm bfcabe9dd73a7e699ae74fab0839b801 wireshark-debuginfo-0.99.5-EL3.1.x86_64.rpm aad3f0b52b39619959761586c374821b wireshark-gnome-0.99.5-EL3.1.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/wireshark-0.99.5-EL3.1.src.rpm c7255e4fa8af9ea9e6f8e1ee725e99e0 wireshark-0.99.5-EL3.1.src.rpm i386: 34ed0d94e523c71598f686e2cd1f12a7 wireshark-0.99.5-EL3.1.i386.rpm 5e1ab6abb2938fbb186b5931a73a657a wireshark-debuginfo-0.99.5-EL3.1.i386.rpm 51c2537226e42b98628130f8bd7c59ae wireshark-gnome-0.99.5-EL3.1.i386.rpm ia64: daf4a17f63e344828751e80281ebb877 wireshark-0.99.5-EL3.1.ia64.rpm 8cef63ff60d2c9a4e477708859710fff wireshark-debuginfo-0.99.5-EL3.1.ia64.rpm 3c80210a835d9daa2001a87b61bfa94f wireshark-gnome-0.99.5-EL3.1.ia64.rpm x86_64: 9cb61c5d8b95d8f83be1625deac47149 wireshark-0.99.5-EL3.1.x86_64.rpm bfcabe9dd73a7e699ae74fab0839b801 wireshark-debuginfo-0.99.5-EL3.1.x86_64.rpm aad3f0b52b39619959761586c374821b wireshark-gnome-0.99.5-EL3.1.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/wireshark-0.99.5-EL3.1.src.rpm c7255e4fa8af9ea9e6f8e1ee725e99e0 wireshark-0.99.5-EL3.1.src.rpm i386: 34ed0d94e523c71598f686e2cd1f12a7 wireshark-0.99.5-EL3.1.i386.rpm 5e1ab6abb2938fbb186b5931a73a657a wireshark-debuginfo-0.99.5-EL3.1.i386.rpm 51c2537226e42b98628130f8bd7c59ae wireshark-gnome-0.99.5-EL3.1.i386.rpm ia64: daf4a17f63e344828751e80281ebb877 wireshark-0.99.5-EL3.1.ia64.rpm 8cef63ff60d2c9a4e477708859710fff wireshark-debuginfo-0.99.5-EL3.1.ia64.rpm 3c80210a835d9daa2001a87b61bfa94f wireshark-gnome-0.99.5-EL3.1.ia64.rpm x86_64: 9cb61c5d8b95d8f83be1625deac47149 wireshark-0.99.5-EL3.1.x86_64.rpm bfcabe9dd73a7e699ae74fab0839b801 wireshark-debuginfo-0.99.5-EL3.1.x86_64.rpm aad3f0b52b39619959761586c374821b wireshark-gnome-0.99.5-EL3.1.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/wireshark-0.99.5-EL4.1.src.rpm f9a8dcaf414f499920f5199dbbc28ca1 wireshark-0.99.5-EL4.1.src.rpm i386: 30bd4ee2fb228d263ed311f658f6dda7 wireshark-0.99.5-EL4.1.i386.rpm d63184791accb985d71796deb495f6ab wireshark-debuginfo-0.99.5-EL4.1.i386.rpm 1882b5a6ebe75341c5487a6475366b44 wireshark-gnome-0.99.5-EL4.1.i386.rpm ia64: 3949dc851c7701f0a5931d54d884470a wireshark-0.99.5-EL4.1.ia64.rpm 65268475b0a25652ff23a134df5a6a41 wireshark-debuginfo-0.99.5-EL4.1.ia64.rpm 0ed02fc9f811c94b3cc348bf6b27c6a5 wireshark-gnome-0.99.5-EL4.1.ia64.rpm ppc: f5d27f3b28bfe94b3fe4b2da9f99dd6e wireshark-0.99.5-EL4.1.ppc.rpm 108a9935cb05adcc7dab9d720cece787 wireshark-debuginfo-0.99.5-EL4.1.ppc.rpm 6287732afaf422b7010907af1f5a2658 wireshark-gnome-0.99.5-EL4.1.ppc.rpm s390: 6b1f7d80530974ec11d2f978f295beaf wireshark-0.99.5-EL4.1.s390.rpm 05843b009505b2d1a08145349798d287 wireshark-debuginfo-0.99.5-EL4.1.s390.rpm 8218d325de4fd6a3438ffde70433444b wireshark-gnome-0.99.5-EL4.1.s390.rpm s390x: aff316b3f3be3641b77008c327ff372f wireshark-0.99.5-EL4.1.s390x.rpm 55e0974d1211d5b8b1db7ff970ea38a8 wireshark-debuginfo-0.99.5-EL4.1.s390x.rpm 1b74eb3df654513a225860f29eb69085 wireshark-gnome-0.99.5-EL4.1.s390x.rpm x86_64: 9c952637d690e2b1bc56d0b7dee10037 wireshark-0.99.5-EL4.1.x86_64.rpm 63a91dec4be24935a00ded591744fdf5 wireshark-debuginfo-0.99.5-EL4.1.x86_64.rpm a7640db353e1b6ed82bfed2f6b69aa80 wireshark-gnome-0.99.5-EL4.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/wireshark-0.99.5-EL4.1.src.rpm f9a8dcaf414f499920f5199dbbc28ca1 wireshark-0.99.5-EL4.1.src.rpm i386: 30bd4ee2fb228d263ed311f658f6dda7 wireshark-0.99.5-EL4.1.i386.rpm d63184791accb985d71796deb495f6ab wireshark-debuginfo-0.99.5-EL4.1.i386.rpm 1882b5a6ebe75341c5487a6475366b44 wireshark-gnome-0.99.5-EL4.1.i386.rpm x86_64: 9c952637d690e2b1bc56d0b7dee10037 wireshark-0.99.5-EL4.1.x86_64.rpm 63a91dec4be24935a00ded591744fdf5 wireshark-debuginfo-0.99.5-EL4.1.x86_64.rpm a7640db353e1b6ed82bfed2f6b69aa80 wireshark-gnome-0.99.5-EL4.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/wireshark-0.99.5-EL4.1.src.rpm f9a8dcaf414f499920f5199dbbc28ca1 wireshark-0.99.5-EL4.1.src.rpm i386: 30bd4ee2fb228d263ed311f658f6dda7 wireshark-0.99.5-EL4.1.i386.rpm d63184791accb985d71796deb495f6ab wireshark-debuginfo-0.99.5-EL4.1.i386.rpm 1882b5a6ebe75341c5487a6475366b44 wireshark-gnome-0.99.5-EL4.1.i386.rpm ia64: 3949dc851c7701f0a5931d54d884470a wireshark-0.99.5-EL4.1.ia64.rpm 65268475b0a25652ff23a134df5a6a41 wireshark-debuginfo-0.99.5-EL4.1.ia64.rpm 0ed02fc9f811c94b3cc348bf6b27c6a5 wireshark-gnome-0.99.5-EL4.1.ia64.rpm x86_64: 9c952637d690e2b1bc56d0b7dee10037 wireshark-0.99.5-EL4.1.x86_64.rpm 63a91dec4be24935a00ded591744fdf5 wireshark-debuginfo-0.99.5-EL4.1.x86_64.rpm a7640db353e1b6ed82bfed2f6b69aa80 wireshark-gnome-0.99.5-EL4.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/wireshark-0.99.5-EL4.1.src.rpm f9a8dcaf414f499920f5199dbbc28ca1 wireshark-0.99.5-EL4.1.src.rpm i386: 30bd4ee2fb228d263ed311f658f6dda7 wireshark-0.99.5-EL4.1.i386.rpm d63184791accb985d71796deb495f6ab wireshark-debuginfo-0.99.5-EL4.1.i386.rpm 1882b5a6ebe75341c5487a6475366b44 wireshark-gnome-0.99.5-EL4.1.i386.rpm ia64: 3949dc851c7701f0a5931d54d884470a wireshark-0.99.5-EL4.1.ia64.rpm 65268475b0a25652ff23a134df5a6a41 wireshark-debuginfo-0.99.5-EL4.1.ia64.rpm 0ed02fc9f811c94b3cc348bf6b27c6a5 wireshark-gnome-0.99.5-EL4.1.ia64.rpm x86_64: 9c952637d690e2b1bc56d0b7dee10037 wireshark-0.99.5-EL4.1.x86_64.rpm 63a91dec4be24935a00ded591744fdf5 wireshark-debuginfo-0.99.5-EL4.1.x86_64.rpm a7640db353e1b6ed82bfed2f6b69aa80 wireshark-gnome-0.99.5-EL4.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/wireshark-0.99.5-1.el5.src.rpm 9d82bbd74ce9e46b5b029ce6c888fca1 wireshark-0.99.5-1.el5.src.rpm i386: 7b122e6649aae58047ba0ba52e95b098 wireshark-0.99.5-1.el5.i386.rpm 2ac3271501487de446ee89927ffab68e wireshark-debuginfo-0.99.5-1.el5.i386.rpm x86_64: c694b461024223123dcccc99e36fbcfe wireshark-0.99.5-1.el5.x86_64.rpm 85472d7d770931966ed35c1ced184148 wireshark-debuginfo-0.99.5-1.el5.x86_64.rpm RHEL Desktop Workstation (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/wireshark-0.99.5-1.el5.src.rpm 9d82bbd74ce9e46b5b029ce6c888fca1 wireshark-0.99.5-1.el5.src.rpm i386: 2ac3271501487de446ee89927ffab68e wireshark-debuginfo-0.99.5-1.el5.i386.rpm 9a1fac83085a7198d5d5e2458a9470f8 wireshark-gnome-0.99.5-1.el5.i386.rpm x86_64: 85472d7d770931966ed35c1ced184148 wireshark-debuginfo-0.99.5-1.el5.x86_64.rpm bfd080375e919294702992180c392d0e wireshark-gnome-0.99.5-1.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/wireshark-0.99.5-1.el5.src.rpm 9d82bbd74ce9e46b5b029ce6c888fca1 wireshark-0.99.5-1.el5.src.rpm i386: 7b122e6649aae58047ba0ba52e95b098 wireshark-0.99.5-1.el5.i386.rpm 2ac3271501487de446ee89927ffab68e wireshark-debuginfo-0.99.5-1.el5.i386.rpm 9a1fac83085a7198d5d5e2458a9470f8 wireshark-gnome-0.99.5-1.el5.i386.rpm ia64: 721f3ceef0332dff923788b52324927a wireshark-0.99.5-1.el5.ia64.rpm e93e9200fcb20e849e5467e5e8e81985 wireshark-debuginfo-0.99.5-1.el5.ia64.rpm 15a81f98c580035a4bdbf6561973eb51 wireshark-gnome-0.99.5-1.el5.ia64.rpm ppc: 31f9643c15386b3e2abda11ba247a0d0 wireshark-0.99.5-1.el5.ppc.rpm b664bfb84a8f9f30d7a3a359dd27ac31 wireshark-debuginfo-0.99.5-1.el5.ppc.rpm 4fb3acc5c5984c27c36d5abb21b79486 wireshark-gnome-0.99.5-1.el5.ppc.rpm s390x: 4d6cf43bf9684f03dc4c2bb629a647dc wireshark-0.99.5-1.el5.s390x.rpm 8b1bc7bbf6cf754e6aee57b1bfa06b78 wireshark-debuginfo-0.99.5-1.el5.s390x.rpm db2d8fc707cefe67c6662591bbd87f69 wireshark-gnome-0.99.5-1.el5.s390x.rpm x86_64: c694b461024223123dcccc99e36fbcfe wireshark-0.99.5-1.el5.x86_64.rpm 85472d7d770931966ed35c1ced184148 wireshark-debuginfo-0.99.5-1.el5.x86_64.rpm bfd080375e919294702992180c392d0e wireshark-gnome-0.99.5-1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0456 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0459 http://www.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2007 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFF+CTQXlSAg2UNWIIRAorZAKCvP7aklDwAM42b/Mb/Wo8vu94rMACdGQ5j GNQI+nqBZS37VZ4SWTDmACY= =aey6 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRfiQDih9+71yA2DNAQKtRAP8CxQIJiBPx2uewU5CZoXLL70SkbjwWv+z 24df2qVUf/tsrrIr147g1cYWCYKWvBPSWwWkmWxKEDaGfccAc5Y4l1oehc9+x45Y p6HvultpI5+oqxgKP3wuNuQKSbs1j+EU4Jg6OzMzWnHkUcwd0CVggjK9BhdR34cs KlX1v0a/8lM= =XpWe -----END PGP SIGNATURE-----