-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2010.0241
            New egroupware packages fix several vulnerabilities
                               12 March 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           egroupware
Publisher:         Debian
Operating System:  Debian GNU/Linux 5
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Cross-site Scripting            -- Remote with User Interaction
Resolution:        Patch/Upgrade

Original Bulletin: 
   http://www.debian.org/security/2010/dsa-2013

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running egroupware check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-2013-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
March 11, 2010                        http://www.debian.org/security/faq
- - ------------------------------------------------------------------------

Package        : egroupware
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)      : not yet available
Debian Bug     : 573279

Nahuel Grisolia discovered two vulnerabilities in Egroupware, a web-based
groupware suite: Missing input sanitising in the spellchecker integration
may lead to the execution of arbitrary commands and a cross-site scripting
vulnerability was discovered in the login page.

For the stable distribution (lenny), these problems have been fixed in
version 1.4.004-2.dfsg-4.2.

The upcoming stable distribution (squeeze), no longer contains egroupware
packages.

We recommend that you upgrade your egroupware packages.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- - --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg-4.2.diff.gz
    Size/MD5 checksum:    35229 1da727f1fb571ac148883ff1cd0d270d
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg-4.2.dsc
    Size/MD5 checksum:     1775 72e364d1bfd007520f004bb62be49caf
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg.orig.tar.gz
    Size/MD5 checksum: 11597406 26012ca8c976dbf4137f5f5c7abcfdaf

Architecture independent packages:

  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-bookmarks_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   105886 548e844db769730c4e63a09046d6c6b7
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-felamimail_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   334336 a8b1b304c76b0ce2ba07aef4d979ee2a
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-mydms_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   569314 ec321c8c1032fc5d563857d600f96667
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-polls_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    41450 047af44eef33721e3e5600e2433d0999
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-calendar_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   447966 b5a50e6ccbab7586351fccf3dc1dd497
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-developer-tools_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    59252 0c2800cd5998eb8acccd6c4ab11a1f62
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-etemplate_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   639436 d5a22274257572b18caa7503d9af72ed
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-emailadmin_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    92244 2e26a6b63744204b9e14944ed5ea727f
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-phpsysinfo_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   201340 f6925e13cba379934ee0498f92fc4596
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:     7738 682ddfca5073843b6f30298050762393
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-resources_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    79552 629ded68172377ab350135900faaa251
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-news-admin_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    69932 36654d065e20e04eaf39a108b94c6f43
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-filemanager_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   171686 45d61216c4a2a2e7cc9dcfbc71b19e2e
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-registration_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   136528 85bef627512808e873cbd25040d6deaf
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-sitemgr_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   627560 0dc27f321b2a075b44e54fe12c6fb428
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-phpbrain_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   143912 85d374aed2b1f462223c93cf13c1eb4b
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-core_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:  4409348 03bf3cfab8fc4a8ccc34848551682d2e
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-infolog_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   273950 1aae22abbbab84bbc36713a7b2d7f9bb
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-tracker_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    89532 6e47505d8098b4e7b5e9e9b7c4c0eafa
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-wiki_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   119642 fabc08c73db4681e36b723719c5c2d66
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-sambaadmin_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    27324 721b208efa3421232f30d809934aaf43
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-addressbook_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   309896 2870dbd2fee65e5e16234483618566c1
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-timesheet_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    67108 cbd37f7f1767cc185989dd4c9feb8ea4
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-manual_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:    34710 8dc500ad3fb1908439939f8474a69670
  http://security.debian.org/pool/updates/main/e/egroupware/egroupware-projectmanager_1.4.004-2.dfsg-4.2_all.deb
    Size/MD5 checksum:   591664 71964dae44c79067d1032554d48fe48d


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkuZbrIACgkQXm3vHE4uylodkQCg5ZWY52QiqXBYxvlD/hgVpdyp
SU4An19ugJi0wrU0tTSCBk/IUwFtwYp8
=L4GI
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFLmXmh/iFOrG6YcBERAoEHAJ4vZQPmGqIo4k4HNA8rl7yvJJuW6QCffRt5
E51/fTEChoBi1obCm5bpJO8=
=nL5e
-----END PGP SIGNATURE-----