-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2009.1342
           New xmltooling packages fix potential code execution
                             25 September 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           xmltooling
Publisher:         Debian
Operating System:  Debian GNU/Linux 5
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Provide Misleading Information  -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade

Original Bulletin: 
   http://www.debian.org/security/2009/dsa-1895

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running xmltooling check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1895-1                  security@debian.org
http://www.debian.org/security/                           Florian Weimer
September 24, 2009                    http://www.debian.org/security/faq
- - ------------------------------------------------------------------------

Package        : xmltooling
Vulnerability  : several
Problem type   : remote
Debian-specific: no

Several vulnerabilities have been discovered in the xmltooling packages,
as used by Shibboleth:

Chris Ries discovered that decoding a crafted URL leads to a crash (and
potentially, arbitrary code execution).

Ian Young discovered that embedded NUL characters in certificate names
were not correctly handled, exposing configurations using PKIX trust
validation to impersonation attacks.

Incorrect processing of SAML metadata ignores key usage constraints.
This minor issue also needs a correction in the opensaml2 packages,
which will be provided in an upcoming stable point release (and,
before that, via stable-proposed-updates).

For the stable distribution (lenny), these problems have been fixed in
version 1.0-2+lenny1.

For the unstable distribution (sid), these problems have been fixed in
version 1.2.2-1.

We recommend that you upgrade your xmltooling packages.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- - --------------------------------

Source archives:

  http://security.debian.org/pool/updates/main/x/xmltooling/xmltooling_1.0-2+lenny1.dsc
    Size/MD5 checksum:     1457 b7a3967d272765308809a5c8d27595ed
  http://security.debian.org/pool/updates/main/x/xmltooling/xmltooling_1.0-2+lenny1.diff.gz
    Size/MD5 checksum:     8943 1317858121f3042e5cfb8367319b1c78
  http://security.debian.org/pool/updates/main/x/xmltooling/xmltooling_1.0.orig.tar.gz
    Size/MD5 checksum:   549767 4e7c21608f0fbdcfd966263f0c350d99

Architecture independent packages:

  http://security.debian.org/pool/updates/main/x/xmltooling/xmltooling-schemas_1.0-2+lenny1_all.deb
    Size/MD5 checksum:    11910 395d8f3a32e0c75da52a27c76f05c76f
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-doc_1.0-2+lenny1_all.deb
    Size/MD5 checksum:   938774 bc039db5a32dd02df34bf8b5146c551e

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_alpha.deb
    Size/MD5 checksum:    75002 bb6a2bebec1586b842d663a55429ebb0
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_alpha.deb
    Size/MD5 checksum:   799538 9cdc74e48b5fd67f300715096adf15a7

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_amd64.deb
    Size/MD5 checksum:   736934 2e220b0edab912f586af6c3d2538f409
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_amd64.deb
    Size/MD5 checksum:    75792 3cc7822c1c88f61130fcf0d03d6e4311

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_arm.deb
    Size/MD5 checksum:   750312 20cd9cd8bb91f2a9755e503e538a550c
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_arm.deb
    Size/MD5 checksum:    75082 3fbb6e674b1b729be300d6255a2729f3

armel architecture (ARM EABI)

  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_armel.deb
    Size/MD5 checksum:   637366 2190e5db31659ca5c58835341f1eb6ce
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_armel.deb
    Size/MD5 checksum:    74554 2638c933e772f9ab2e9720f1b0436935

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_hppa.deb
    Size/MD5 checksum:   850440 a4e865bd4774c483559c99df549a3bfa
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_hppa.deb
    Size/MD5 checksum:    75102 7546f61b1564b4c5c49ad69c71c7d223

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_i386.deb
    Size/MD5 checksum:    74980 836fc866e7446cf594281eda1602c81f
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_i386.deb
    Size/MD5 checksum:   683958 4556a60904d3c09d735301cbadd463f4

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_ia64.deb
    Size/MD5 checksum:    74052 7168ee5c68b5d5e41ac996e3b98ba2b8
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_ia64.deb
    Size/MD5 checksum:   938056 b550972c349c99aa5b11473868531a4a

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_mips.deb
    Size/MD5 checksum:   697412 189506c8bd9473f11e09275f613c2e61
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_mips.deb
    Size/MD5 checksum:    74992 933d28c7a0bb457488bcf37442f999ef

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_mipsel.deb
    Size/MD5 checksum:   663610 8105a8478fe3d8a0724745c0597893e8
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_mipsel.deb
    Size/MD5 checksum:    74064 e8700e64464a0cf15a5ef070b759a84c

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_powerpc.deb
    Size/MD5 checksum:    74072 e6444eda8c40348c9fa6025c770bf01e
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_powerpc.deb
    Size/MD5 checksum:   777756 2e226da34bd88e91d5615704267d9e35

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_s390.deb
    Size/MD5 checksum:    74040 7340da0a7d36d8c6029e8b40a75cef2b
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_s390.deb
    Size/MD5 checksum:   745620 0a66b47c6a055692b2467502c1158a2e

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_sparc.deb
    Size/MD5 checksum:    74060 4ad661aacce58a25ea2491489d23a242
  http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_sparc.deb
    Size/MD5 checksum:   828332 eb2255da533a6bdf3876afdb11c8ca73


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJKu8OmAAoJEL97/wQC1SS+qXkIAKQBkSJUT+7rWIWk/pP7qOTX
opraqKIQjVsqA8rC0tLPoXxpoHCAbSLggDDVt5oCB/HttOm+WiEXLuFfKrwYqHpq
m9fXyzCsu1QGdQ1jtDKWM9TLdiap83N56EtZG0zdufJovggqbrMqLJiykK1cR7kz
iAHX2BEc9pDCLJ3CjDXsZyIQbX5In6NI9/WMtk4MOd7bgZHhE+OHUw92WP+Vd8kr
WcHP3SpaPuup/sRV5/SF4ju5HAjsu5kvTCP530hcC5Z2DBX5/pacb+MeRARmZDAv
Ucql3MwbazsfouWilLUGjrOwRyTQIpqQfjYPMitciki3Vvhk27+ypoIr0pyAaJM=
=J0h+
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFKu/u3NVH5XJJInbgRAl3vAJ9X+XeZ2awaeKe9CkbwQ2a2ueAFBQCeO3fM
qUHR5XAUvt0rxmz3IjGBfJM=
=bu9k
-----END PGP SIGNATURE-----