-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1432
                     libstruts1.2-java security update
                              22 August 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libstruts1.2-java
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0114  

Reference:         ASB-2014.0077
                   ESB-2014.1386
                   ESB-2014.1383
                   ESB-2014.1339
                   ESB-2014.1336
                   ESB-2014.1326
                   ESB-2014.1310
                   ESB-2014.1305
                   ESB-2014.1304
                   ESB-2014.1297
                   ESB-2014.1275
                   ESB-2014.1264
                   ESB-2014.1120
                   ESB-2014.1117
                   ESB-2014.1068
                   ESB-2014.0985
                   ESB-2014.0984
                   ESB-2014.0954
                   ESB-2014.0866
                   ESB-2014.0865
                   ESB-2014.0839
                   ESB-2014.0827
                   ESB-2014.0804
                   ESB-2014.0761
                   ESB-2014.0744
                   ESB-2014.0739
                   ESB-2014.0738
                   ESB-2014.0737
                   ESB-2014.0684

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-2940

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2940-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
Aug 21, 2014                           http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : libstruts1.2-java
CVE ID         : CVE-2014-0114

It was discovered that missing access checks in the Struts ActionForm 
object could result in the execution of arbitrary code.

For the stable distribution (wheezy), this problem has been fixed in
version 1.2.9-5+deb7u1.

For the unstable distribution (sid), this problem has been fixed in
version 1.2.9-9.

We recommend that you upgrade your libstruts1.2-java packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=yEUi
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=T5in
-----END PGP SIGNATURE-----