-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                ESB-2007.0266 -- [Win][UNIX/Linux][Debian]
              New clamav packages fix several vulnerabilities
                               26 April 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              ClamAV
Publisher:            Debian
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
                      Debian GNU/Linux 4.0
                      Debian GNU/Linux 3.1
Impact:               Execute Arbitrary Code/Commands
                      Denial of Service
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-2029 CVE-2007-1997 CVE-2007-1745

Ref:                  ESB-2007.0248

Original Bulletin:    http://www.debian.org/security/2007/dsa-1281

Comment: Besides the two vulnerabilities previously reported in ESB-2007.0248,
         this advisory describes a new denial of service vulnerability
         when handling PDF files.
         
         This advisory references vulnerabilities in products which run on
         platforms other than Debian. It is recommended that administrators
         running ClamAV check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 1281-1                    security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
April 25th, 2006                        http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : clamav
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2007-1745 CVE-2007-1997 CVE-2007-2029

Several remote vulnerabilities have been discovered in the Clam anti-virus
toolkit. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2007-1745

    It was discovered that a file descriptor leak in the CHM handler may
    lead to denial of service.

CVE-2007-1997

    It was discovered that a buffer overflow in the CAB handler may lead
    to the execution of arbitrary code.

CVE-2007-2029

    It was discovered that a file descriptor leak in the PDF handler may
    lead to denial of service.

For the oldstable distribution (sarge) these problems have been fixed in
version 0.84-2.sarge.16.

For the stable distribution (etch) these problems have been fixed
in version 0.90.1-3etch1.

For the unstable distribution (sid) these problems have been fixed in
version 0.90.2-1.

We recommend that you upgrade your clamav packages. Packages for
the arm, sparc, m68k and mipsen architectures are not yet available.
They will be provided later.

Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.16.dsc
      Size/MD5 checksum:      874 750b482eeb436112babe47c8d4e462f4
    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.16.diff.gz
      Size/MD5 checksum:   187501 4fa4f6002ac647a88cc991491026f495
    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84.orig.tar.gz
      Size/MD5 checksum:  4006624 c43213da01d510faf117daa9a4d5326c

  Architecture independent components:

    http://security.debian.org/pool/updates/main/c/clamav/clamav-base_0.84-2.sarge.16_all.deb
      Size/MD5 checksum:   155282 27dda07f76c431190815699c933c96f1
    http://security.debian.org/pool/updates/main/c/clamav/clamav-docs_0.84-2.sarge.16_all.deb
      Size/MD5 checksum:   690904 0599cd77c6f729719f7d2218238286dc
    http://security.debian.org/pool/updates/main/c/clamav/clamav-testfiles_0.84-2.sarge.16_all.deb
      Size/MD5 checksum:   124268 dc29df62c5e663ac861871fb261c8f5f

  Alpha architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.16_alpha.deb
      Size/MD5 checksum:    74760 6f5e17b5709704bb3cbb5df87886c535
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.16_alpha.deb
      Size/MD5 checksum:    48704 42d401657e3ce03e9b3f8bc8c2eb6c2a
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.16_alpha.deb
      Size/MD5 checksum:  2175750 6362f96b3ea12a7756a65be181ade900
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.16_alpha.deb
      Size/MD5 checksum:    41738 fc892161427bb646375cd488ccdf8cf4
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.16_alpha.deb
      Size/MD5 checksum:   256048 08a862b95ba887ef60d7e782b3860c4b
    http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.16_alpha.deb
      Size/MD5 checksum:   286514 911985fc43f62e1648fc49c699873102

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.16_amd64.deb
      Size/MD5 checksum:    69018 d3cdbb0197531ab9c9b2da5fdd3f28d2
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.16_amd64.deb
      Size/MD5 checksum:    44290 8dfb6f556b0e94177ced1b8437fd05c6
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.16_amd64.deb
      Size/MD5 checksum:  2173300 4bddbe30c350a2cdf7085401d9ba2bd4
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.16_amd64.deb
      Size/MD5 checksum:    40044 fe9c8fbf07d5bb4f2ea8c186fa4554d0
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.16_amd64.deb
      Size/MD5 checksum:   176820 671a48baa1cff978ba6ac698bd92ce35
    http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.16_amd64.deb
      Size/MD5 checksum:   260434 fcbd3ed5d6d195d941ae8c2c4be78583

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.16_i386.deb
      Size/MD5 checksum:    65316 388cb174e2802231f2e00be75e557525
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.16_i386.deb
      Size/MD5 checksum:    40360 eb1b678e9f9e6902baf07337031a15c9
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.16_i386.deb
      Size/MD5 checksum:  2171592 538f510efe1172159b580d2de8a685e3
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.16_i386.deb
      Size/MD5 checksum:    38060 fc3bbba2437c2822000e045c6709c8b0
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.16_i386.deb
      Size/MD5 checksum:   159914 61cff431ff68479054321cae6ce49434
    http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.16_i386.deb
      Size/MD5 checksum:   255106 06c6210c2302fa4b12539f5d9d6ed90c

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.16_ia64.deb
      Size/MD5 checksum:    81948 b2532d41280dd297e11fe259cda69f43
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.16_ia64.deb
      Size/MD5 checksum:    55324 4ece492972b78bd0a85a0a349219ba0c
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.16_ia64.deb
      Size/MD5 checksum:  2180240 d59d5be58695e7eda4bb850329b61eaf
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.16_ia64.deb
      Size/MD5 checksum:    49242 25aebadfb837f4b693c0ca7f00d7d7e5
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.16_ia64.deb
      Size/MD5 checksum:   252464 9a98dab31c6cbd4010a070af84586379
    http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.16_ia64.deb
      Size/MD5 checksum:   318554 ebfcc4e83fcce638cf4d6fd204f406ba

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.16_powerpc.deb
      Size/MD5 checksum:    69390 825a3ff9344b0ff0040c9009043d0345
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.16_powerpc.deb
      Size/MD5 checksum:    44728 719d0f39e79ca450060ccf2b31841893
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.16_powerpc.deb
      Size/MD5 checksum:  2173682 4da2c1673aec276f67dd78f418e20418
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.16_powerpc.deb
      Size/MD5 checksum:    38890 13405ffbf96d22acac493dd5ca2561f9
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.16_powerpc.deb
      Size/MD5 checksum:   187910 3f20cb90f59c59296469564288bc851f
    http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.16_powerpc.deb
      Size/MD5 checksum:   265536 7f953c829582ff78a9c059e9a21c7ecc

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.16_s390.deb
      Size/MD5 checksum:    67964 2e69d92100ff9b5af69d2c6482c332e6
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.16_s390.deb
      Size/MD5 checksum:    43642 4bc4573c069697913e88f90ce180bc78
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.16_s390.deb
      Size/MD5 checksum:  2172968 095a7323846207c070de4be0cfca904b
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.16_s390.deb
      Size/MD5 checksum:    38966 20219f58e85b9bd3742941042bf536b0
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.16_s390.deb
      Size/MD5 checksum:   182852 1c38c0a2187b948fa7062a50a93d26ce
    http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.16_s390.deb
      Size/MD5 checksum:   270160 298f91ebdd0f8fec45c7115a71e9ff76


Debian GNU/Linux 4.0 alias etch
- - -------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch1.dsc
      Size/MD5 checksum:      886 03ca483d25aa8a5843c0334454fa854b
    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch1.diff.gz
      Size/MD5 checksum:   198874 332face9b6c9dd61ea183b97920d58e6
    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1.orig.tar.gz
      Size/MD5 checksum: 11643310 cd11c05b5476262eaea4fa3bd7dc25bf

  Architecture independent components:

    http://security.debian.org/pool/updates/main/c/clamav/clamav-base_0.90.1-3etch1_all.deb
      Size/MD5 checksum:   201166 15ff75fe7f8d74c20a1ed138a3ef96a3
    http://security.debian.org/pool/updates/main/c/clamav/clamav-docs_0.90.1-3etch1_all.deb
      Size/MD5 checksum:  1002982 c522f91db205e1317d7ffa4fcff219cc
    http://security.debian.org/pool/updates/main/c/clamav/clamav-testfiles_0.90.1-3etch1_all.deb
      Size/MD5 checksum:   157358 8f0bccc0ffe35df7afd1c970e7a6424d

  Alpha architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch1_alpha.deb
      Size/MD5 checksum:   863012 56735cac5c48a2b1cff498aa74af5b74
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch1_alpha.deb
      Size/MD5 checksum:   184208 d61917178e7334eb9267834929ec3ac1
    http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch1_alpha.deb
      Size/MD5 checksum:   643690 8a9d04ad670ff22316a894a6ee693526
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch1_alpha.deb
      Size/MD5 checksum:  9303270 89869fa569a5b7a8175c5eae35d2dc4c
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch1_alpha.deb
      Size/MD5 checksum:   179372 7a1dba33725c9de4ece9641d2b1c4b2f
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch1_alpha.deb
      Size/MD5 checksum:   509666 e47d02325d68fe25a875843c6d390b80
    http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch1_alpha.deb
      Size/MD5 checksum:   405480 38ccb1a5c657c5c70f410f94d66c93a1

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch1_amd64.deb
      Size/MD5 checksum:   856028 b605cea366cd60582a4f2926cd8dbbf0
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch1_amd64.deb
      Size/MD5 checksum:   177964 d26c6f071ae2f9ef5a6a446ffdc79dac
    http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch1_amd64.deb
      Size/MD5 checksum:   637432 dc8505b28e41acc8ae53502ddaeae429
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch1_amd64.deb
      Size/MD5 checksum:  9301322 90c4819bcecb55a12dc94fdbd868b5e8
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch1_amd64.deb
      Size/MD5 checksum:   176430 16d4a80aef673ec34e4c771013835463
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch1_amd64.deb
      Size/MD5 checksum:   385728 391eab43682d135cd5a7321067b358e1
    http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch1_amd64.deb
      Size/MD5 checksum:   366562 c71cc7f8c0cb058a725b7e8d6cc76df0

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch1_hppa.deb
      Size/MD5 checksum:   856792 69390669062759614b5068a91daf47fd
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch1_hppa.deb
      Size/MD5 checksum:   177694 4e12f71d9e471ab44270ef8629c566f9
    http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch1_hppa.deb
      Size/MD5 checksum:   617522 5157056214621eed9948cfcd417b56c3
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch1_hppa.deb
      Size/MD5 checksum:  9302752 c8176be01a85cce59bce5869643e425a
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch1_hppa.deb
      Size/MD5 checksum:   176522 f4379b7ca228397a28a2e040e890a3a5
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch1_hppa.deb
      Size/MD5 checksum:   432108 07f29046db300ff6a57a86367c940e44
    http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch1_hppa.deb
      Size/MD5 checksum:   404280 d69e5a48f1ff41d90885029f7212963b

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch1_i386.deb
      Size/MD5 checksum:   853434 e33737d0e8eeae82880dee160b884e4c
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch1_i386.deb
      Size/MD5 checksum:   174318 188d945b3c78e3d540a8288115eb4923
    http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch1_i386.deb
      Size/MD5 checksum:   603398 56ab1e4be6b9a86ef5b9ccfbf9d6faa2
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch1_i386.deb
      Size/MD5 checksum:  9299850 b15d3a6570be05bf476bd9cd5821f179
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch1_i386.deb
      Size/MD5 checksum:   174450 d33e361d311972a8f832e9a5c9cacd02
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch1_i386.deb
      Size/MD5 checksum:   367182 c46322a281159fad5ee98725b293f295
    http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch1_i386.deb
      Size/MD5 checksum:   365140 33b24038fd1f0cd610e18c5e9a6a45a8

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch1_ia64.deb
      Size/MD5 checksum:   878008 af774d8ff869cf7f6c2f01ecc7c066bf
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch1_ia64.deb
      Size/MD5 checksum:   201168 74a33b6216e0e8210f6cd64d9b01e84a
    http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch1_ia64.deb
      Size/MD5 checksum:   656168 74cd735a0f44db53d22d0d97847375fa
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch1_ia64.deb
      Size/MD5 checksum:  9314758 b82acf9cc3c39df48574d645ff66dbcc
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch1_ia64.deb
      Size/MD5 checksum:   190824 94493ed780a6188f973d4bff2b54b1dd
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch1_ia64.deb
      Size/MD5 checksum:   520604 a139c1db4f8e08468e3138b3c17412c1
    http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch1_ia64.deb
      Size/MD5 checksum:   474144 354eec2bd1aa062fb9e1150068b88f77

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch1_powerpc.deb
      Size/MD5 checksum:   856836 db956d3268e97ee29c056b92bfe175c6
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch1_powerpc.deb
      Size/MD5 checksum:   181406 31d55adca529fcd1f843d35c4fe5733e
    http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch1_powerpc.deb
      Size/MD5 checksum:   636432 c15e564ca0bba6f47553a15c52f70224
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch1_powerpc.deb
      Size/MD5 checksum:  9301660 e57ce0bdd33f992cf842c47146160272
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch1_powerpc.deb
      Size/MD5 checksum:   175544 806666c67449d7539310ce20e986892c
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch1_powerpc.deb
      Size/MD5 checksum:   405180 b1a347e43bf7d8e0f5f89012d59b5bb6
    http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch1_powerpc.deb
      Size/MD5 checksum:   377662 fa0be5ca2222ba19f85549416daf0333

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch1_s390.deb
      Size/MD5 checksum:   854784 38773a96cc7e238cfbff8e301af67e7f
    http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch1_s390.deb
      Size/MD5 checksum:   175982 314d4bb67d61d26c374a80d2fb7d177e
    http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch1_s390.deb
      Size/MD5 checksum:   627524 9b9f81c79c2fca92d060163a6cba5d3d
    http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch1_s390.deb
      Size/MD5 checksum:  9300600 19ab58095839cac85be2f22f326859a3
    http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch1_s390.deb
      Size/MD5 checksum:   176114 3375fd42709def635bf4929fe404a6f2
    http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch1_s390.deb
      Size/MD5 checksum:   401188 28cde64e90a013bdf66a28f1b7d9058b
    http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch1_s390.deb
      Size/MD5 checksum:   390658 40ead43ae79832d790c0e8fd290f0b8e

  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGL5W/Xm3vHE4uyloRAp+jAJ4pflWP+VWUO1VU/DndDSXxDKrSDgCg5x0M
XJSCha33+9GfnFSLazQZZsE=
=cunR
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRjAxsCh9+71yA2DNAQK68AP/Z1Z6Y/NIFxd2zaX0/ZHAti/rmxCtLax9
H6FFQ+LTTASelsEMhDIrOHXn+luAUJVp3P+sKiydXv3vm2YMygq0S7sj6CYnGvzH
2ifQs5GKDW7VtCydkwybWonK9lvyOiGPHmSfQfLyx955TLG2JFwtOzpT3GH2mhr6
RIDn7gcn5ZQ=
=/4S4
-----END PGP SIGNATURE-----