Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2012.0916 Security Bulletin: Security Vulnerabilities fixed in IBM WebSphere Application Server 6.1.0.45 and 7.0.0.25 25 September 2012 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM WebSphere Application Server Publisher: IBM Operating System: AIX HP-UX Linux variants Solaris Windows Impact/Access: Administrator Compromise -- Existing Account Increased Privileges -- Remote with User Interaction Overwrite Arbitrary Files -- Remote/Unauthenticated Modify Arbitrary Files -- Existing Account Denial of Service -- Remote/Unauthenticated Cross-site Scripting -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Unauthorised Access -- Existing Account Reduced Security -- Unknown/Unspecified Resolution: Patch/Upgrade CVE Names: CVE-2012-3325 CVE-2012-3311 CVE-2012-3306 CVE-2012-3305 CVE-2012-3304 CVE-2012-3293 CVE-2012-2191 CVE-2012-2190 CVE-2012-2170 Reference: ESB-2012.0822 ESB-2012.0801 ESB-2012.0726 ESB-2012.0508 Original Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21611311 http://www-01.ibm.com/support/docview.wss?uid=swg21611313 Comment: This bulletin contains two (2) security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: Security Vulnerabilities fixed in IBM WebSphere Application Server 6.1.0.45 Flash (Alert) Document Information WebSphere Application Server General Software version: 6.1 Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows, i5/OS, z/OS Software edition: Base, Developer, Express, Network Deployment Reference #: 1611311 Modified date: 2012-09-24 Abstract Cross reference list for security vulnerabilities fixed in IBM WebSphere Application Server Fix Pack 6.1.0.45 Content VULNERABILITY DETAILS: CVE ID: CVE-2012-3304 (PM54356) DESCRIPTION: WebSphere Application Server could allow a remote attacker to hijack a valid users session, caused by an error in the Administrative Console. An attacker could exploit this vulnerability to gain privileges of the victim. CVSS: CVSS Base Score: 6.8 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77476 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:P/I:P/A:P) AFFECTED PLATFORMS: The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1 REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical Fix: Apply a Fix Pack or PTF containing this APAR PM54356, as noted below: For IBM WebSphere Application Server : For V8.5: o Install Fix Pack 1 (8.5.0.1), or later (targeted to be available 29 October 2012). For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted to be available 12 November 2012). For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later. For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later. Workaround(s): None Mitigation(s): none CVE ID: CVE-2012-2170 (PM56183) DESCRIPTION: WebSphere Application Server could allow a network attacker to obtain sensitive information, caused by improper handling of requests. The customer must have the default Application Snoop Servlet installed and running. CVSS: CVSS Base Score: 4.3 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/75234 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:P/I:N/A:N) AFFECTED PLATFORMS: The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected: Version 8 Version 7 Version 6.1 REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical Fix: Apply a Fix Pack or PTF containing this APAR PM56183, as noted below: For IBM WebSphere Application Server : For V8.0 through 8.0.0.3: o Install Fix Pack 4 (8.0.0.4), or later. For V7.0 through 7.0.0.21: o Install Fix Pack 23 (7.0.0.23), or later. For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later. Workaround(s): None Mitigation(s): none CVE ID: CVE-2012-3293 (PM60839) DESCRIPTION: WebSphere Application Server Administrative Console could allow a cross-frame scripting attack, caused by improper validation of input in the Administrative Console. A remote attacker could exploit this vulnerability to monitor and capture user activity. CVSS: CVSS Base Score: 4.3 CVSS Temporal Score: Seehttp://xforce.iss.net/xforce/xfdb/77179 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N) AFFECTED PLATFORMS: The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1 REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical Fix: Apply a Fix Pack or PTF containing this APAR PM60839, as noted below: For IBM WebSphere Application Server For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later (targeted to be available 29 October 2012). For V8.0 through 8.0.0.3: o Install Fix Pack 4 (8.0.0.4), or later. For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later. For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later. Workaround(s): None Mitigation(s): When you have the Administrator Console open, do not use your web browser to visit other websites. Open another web browser to visit other websites. CVE ID: CVE-2012-2190 and CVE-2012-2191 (PM66218) DESCRIPTION: IBM HTTP Server may be vulnerable to a denial of service. By sending a specially-crafted Secure Sockets Layer (SSL) packets to the vulnerable Web server, a remote attacker could cause a segmentation fault. CVE-2012-2190 CVSS: CVSS Base Score: 5.0 CVSS Temporal Score: Seehttp://xforce.iss.net/xforce/xfdb/75994 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVE-2012-2191 CVSS: CVSS Base Score: 5.0 CVSS Temporal Score: Seehttp://xforce.iss.net/xforce/xfdb/75996 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P) AFFECTED PLATFORMS: The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1 REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical Fix: Apply a Fix Pack or PTF containing this APAR PM66218, as noted below: For IBM WebSphere Application Server : For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later (targeted to be available 29 October 2012). For V8.0 through 8.0.0.3: o Install Fix Pack 4 (8.0.0.4), or later. For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later. For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later. Workaround(s): None Mitigation(s): None CVE ID: CVE-2012-3325 (PM71296) DESCRIPTION: If you have installed an Interim Fix for PM44303, or a fix pack containing PM44303, you have the potential for an authenticated attacker to bypass security restrictions, caused by an error when validating user credentials. This could allow a user to gain unauthorized administrative access to an application and potentially gain access to confidential and critical customer data. For more information please refer to Flash: http://www-01.ibm.com/support/docview.wss?uid=swg21609067 CVSS: CVSS Base Score: 6.0 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77959 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:S/C:P/I:P/A:P) AFFECTED PLATFORMS: The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1 REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical Fix: Apply a Fix Pack or PTF containing this APAR PM71296, as noted below: For IBM WebSphere Application Server : For V8.5: o Install Fix Pack 1 (8.5.0.1), or later (targeted to be available 29 October 2012). For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted to be available 12 November 2012). For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later. For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later. Workaround(s): None Mitigation(s): none REFERENCES: http://www.ibm.com/support/docview.wss?uid=swg21496117 Complete CVSS Guide http://www.first.org/cvss/cvss-guide.html On-line Calculator V2 http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2 CHANGE HISTORY: 24 September 2012: Original copy published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. Copyright and trademark information IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml. - ------------------------------------------------------------------------------- Security Bulletin: Security Vulnerabilities fixed in IBM WebSphere Application Server 7.0.0.25 Flash (Alert) Document information WebSphere Application Server General Software version: 7.0 Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows, i5/OS, z/OS Software edition: Base, Developer, Express, Network Deployment Reference #: 1611313 Modified date: 2012-09-24 Abstract Cross reference list for security vulnerabilities fixed in IBM WebSphere Application Server Fix Pack 7.0.0.25 Content VULNERABILITY DETAILS: CVE ID: CVE-2012-3304 (PM54356) DESCRIPTION: WebSphere Application Server could allow a remote attacker to hijack a valid users session, caused by an error in the Administrative Console. An attacker could exploit this vulnerability to gain privileges of the victim. CVSS: CVSS Base Score: 6.8 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77476 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:P/I:P/A:P) AFFECTED PLATFORMS: The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1 REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical Fix: Apply a Fix Pack or PTF containing this APAR PM54356, as noted below: For IBM WebSphere Application Server : For V8.5: o Install Fix Pack 1 (8.5.0.1), or later (targeted to be available 29 October 2012). For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted to be available 12 November 2012). For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later. For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later. Workaround(s): None Mitigation(s): none CVE ID: CVE-2012-3293 (PM60839) DESCRIPTION: WebSphere Application Server Administrative Console could allow a cross-frame scripting attack, caused by improper validation of input in the Administrative Console. A remote attacker could exploit this vulnerability to monitor and capture user activity. CVSS: CVSS Base Score: 4.3 CVSS Temporal Score: Seehttp://xforce.iss.net/xforce/xfdb/77179 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N) AFFECTED PLATFORMS: The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1 REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical Fix: Apply a Fix Pack or PTF containing this APAR PM60839, as noted below: For IBM WebSphere Application Server For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later (targeted to be available 29 October 2012). For V8.0 through 8.0.0.3: o Install Fix Pack 4 (8.0.0.4), or later. For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later. For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later. Workaround(s): None Mitigation(s): When you have the Administrator Console open, do not use your web browser to visit other websites. Open another web browser to visit other websites. CVE ID: CVE-2012-3311 (PM61388) DESCRIPTION: WebSphere Application Server, when running on z/OS could allow a local attacker to bypass security restrictions, caused by a failure to perform CBIND checks when using Federated Repositories for IIOP connections using Optimized Local Adapters. An attacker could exploit this vulnerability via a client application to access or modify application data. CVSS: CVSS Base Score: 3 CVSS Temporal Score: Seehttp://xforce.iss.net/xforce/xfdb/77697 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:L/AC:M/Au:S/C:P/I:P/A:N) AFFECTED PLATFORMS: The following IBM WebSphere Application Server for z/OS operating system Versions are affected: Version 8.5 Version 8 Version 7 REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical Fix: Apply a Fix Pack or PTF containing this APAR PM61388, as noted below: For IBM WebSphere Application Server For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later (targeted to be available 29 October 2012). For V8.0 through 8.0.0.4: o Install Fix Pack 4 (8.0.0.5), or later (targeted to be available 12 November 2012). For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later. For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later. Workaround(s): None Mitigation(s): None CVE ID: CVE-2012-2190 and CVE-2012-2191 (PM66218) DESCRIPTION: IBM HTTP Server may be vulnerable to a denial of service. By sending a specially-crafted Secure Sockets Layer (SSL) packets to the vulnerable Web server, a remote attacker could cause a segmentation fault. CVE-2012-2190 CVSS: CVSS Base Score: 5.0 CVSS Temporal Score: Seehttp://xforce.iss.net/xforce/xfdb/75994 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVE-2012-2191 CVSS: CVSS Base Score: 5.0 CVSS Temporal Score: Seehttp://xforce.iss.net/xforce/xfdb/75996 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:N/A:P) AFFECTED PLATFORMS: The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1 REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical Fix: Apply a Fix Pack or PTF containing this APAR PM66218, as noted below: For IBM WebSphere Application Server : For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later (targeted to be available 29 October 2012). For V8.0 through 8.0.0.3: o Install Fix Pack 4 (8.0.0.4), or later. For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later. For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later. Workaround(s): None Mitigation(s): None CVE ID: CVE-2012-3305 (PM62467) DESCRIPTION: WebSphere Application Server could allow a remote attacker to traverse directories on the system. An attacker could exploit this vulnerability by deploying a specially-crafted application file to overwrite files outside of the application deployment directory. CVSS: CVSS Base Score: 5.8 CVSS Temporal Score: Seehttp://xforce.iss.net/xforce/xfdb/77477 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:P) AFFECTED PLATFORMS: The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1 REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical Fix: Apply a Fix Pack or PTF containing this APAR PM62467, as noted below: For IBM WebSphere Application Server For V8.5 : o Install Fix Pack 1 (8.5.0.1), or later (targeted to be available 29 October 2012). For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted to be available 12 November 2012). For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later. For V6.1.0 through 6.1.0.45: o Install Fix Pack 47 (6.1.0.47), or later (check back for target date) Workaround(s): None Mitigation(s): none CVE ID: CVE-2012-3306 (PM66514) DESCRIPTION: WebSphere Application Server could provide weaker than expected security caused by a failure to purge passwords from the authentication cache when multi domain support is enabled. CVSS: CVSS Base Score: 4.3 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77478 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N) AFFECTED PLATFORMS: The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected: Version 8.5 Version 8 Version 7 REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical Fix: Apply a Fix Pack or PTF containing this APAR PM66514, as noted below: For IBM WebSphere Application Server : For V8.5: o Install Fix Pack 1 (8.5.0.1), or later (targeted to be available 29 October 2012). For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted to be available 12 November 2012). For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later. For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later. Workaround(s): None Mitigation(s): none CVE ID: CVE-2012-3325 (PM71296) DESCRIPTION: If you have installed an Interim Fix for PM44303, or a fix pack containing PM44303, you have the potential for an authenticated attacker to bypass security restrictions, caused by an error when validating user credentials. This could allow a user to gain unauthorized administrative access to an application and potentially gain access to confidential and critical customer data. For more information please refer to Flash: http://www-01.ibm.com/support/docview.wss?uid=swg21609067 CVSS: CVSS Base Score: 6.0 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/77959 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:S/C:P/I:P/A:P) AFFECTED PLATFORMS: The following IBM WebSphere Application Server for distributed operating systems, IBM i operating systems, and z/OS operating system Versions are affected: Version 8.5 Version 8 Version 7 Version 6.1 REMEDIATION: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical Fix: Apply a Fix Pack or PTF containing this APAR PM71296, as noted below: For IBM WebSphere Application Server : For V8.5: o Install Fix Pack 1 (8.5.0.1), or later (targeted to be available 29 October 2012). For V8.0 through 8.0.0.4: o Install Fix Pack 5 (8.0.0.5), or later (targeted to be available 12 November 2012). For V7.0 through 7.0.0.23: o Install Fix Pack 25 (7.0.0.25), or later. For V6.1.0 through 6.1.0.43: o Install Fix Pack 45 (6.1.0.45), or later. Workaround(s): None Mitigation(s): none REFERENCES: Complete CVSS Guide http://www.first.org/cvss/cvss-guide.html On-line Calculator V2 http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2 CHANGE HISTORY: 24 September 2012: Original copy published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. Copyright and trademark information IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUGE3/+4yVqjM2NGpAQLtnRAAjQGn/HEibJVXpEStDyv06eau8CM+nHg6 R/feaTMhuqCk0RLETf2woMe9QVCt7BhTY0DBGCAlW7sCD8WjGG79wi8Ap6FqLFhz R2uf1TOFzdlEZZSF82l+twCU9dZap5KUlwKd9MP3n0yHvDEA8Wcbv262SHZRqvdf WIDPjDId8Q6tBI8xkQ+arfdiv0CpXZy4RX3vg93Bed9kYhH905zDc4yStO0apfJk +tVUjGvZVdNVOHApxl1ROclYGOT1SIAdHxRel7Dzb9gSgkurza3M1XVADMKMq45P uEdLlo7TBcCdIvhPT+FAcusQYwEucUrxNT0MOMwXg971pOvFBVLm+5bQkUIWOaqH 1Wo25yQry9nkvvd0t0jAAsiaL7fMahVw4sN8GOw3tIYF8AkfdT03K3YvNTFbCj5f 96vj8tfrndOW9TH01NCzzdgTKHN6PXd8kJVX26p10lXSLNZKTDuWc2AE5Lah6w6x /J+2f/qkr7vMTTlqLWtwyfjWWjtUXLMWM+QIES//DICWXK+gbJUiv6hk8rRgKow/ bovgn3+6DaXBZehnKOmxOocHHmq+I+V1bjVGjEzll0gyqeUGU8XXCwWS6ktSUjmS T98T4/7dSCO9i5ernIjYv6tRSCn7XPU6QCaz3BdvhX5b5SC7rQcBUUGE3CckoFEA tjarNnN4aSU= =OiWX -----END PGP SIGNATURE-----