-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1051
                   libemail-address-perl security update
                               30 June 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libemail-address-perl
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0477  

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-2969

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running libemail-address-perl check for an updated version of the 
         software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2969-1                   security@debian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
June 27, 2014                          http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : libemail-address-perl
CVE ID         : CVE-2014-0477

Bastian Blank reported a denial of service vulnerability in
Email::Address, a Perl module for RFC 2822 address parsing and creation.
Email::Address::parse used significant time on parsing empty quoted
strings. A remote attacker able to supply specifically crafted input to
an application using Email::Address for parsing, could use this flaw to
mount a denial of service attack against the application.

For the stable distribution (wheezy), this problem has been fixed in
version 1.895-1+deb7u1.

For the testing distribution (jessie), this problem has been fixed in
version 1.905-1.

For the unstable distribution (sid), this problem has been fixed in
version 1.905-1.

We recommend that you upgrade your libemail-address-perl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=ZR/s
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ho7s
-----END PGP SIGNATURE-----