-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.1007
                  movabletype-opensource security update
                               16 April 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           movabletype-opensource
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-0845  

Original Bulletin: 
   http://www.debian.org/security/2015/dsa-3227

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running movabletype-opensource check for an updated version of the 
         software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3227-1                   security@debian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
April 15, 2015                         http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : movabletype-opensource
CVE ID         : CVE-2015-0845

John Lightsey discovered a format string injection vulnerability in the
localisation of templates in Movable Type, a blogging system. An
unauthenticated remote attacker could take advantage of this flaw to
execute arbitrary code as the web server user.

For the stable distribution (wheezy), this problem has been fixed in
version 5.1.4+dfsg-4+deb7u3.

We recommend that you upgrade your movabletype-opensource packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJVLrWkAAoJEAVMuPMTQ89Eh28QAI+XLCngSLbVuh1INsDiZ5q9
rACZEfaxJUM8qBttCVavqdb68H8xsA/3rk7O4HqLT67wMYoTMTI5Z6tr13klaXmc
VYQONiClmTfFWPnmtyKVhuSzwgOQk06FLZKimOMs41IjS3iW/zqm0LpQOZcM1Bfu
dNswRyFEx729MQ+xL5vXpnivzzdS9j5cf+3dERmziEIWwYky64Y1RC+mvkZ5Pfbc
XrLTn1UIOK6ZrVb6BFJQl8ZBeqfg1HWUA/lns2OZr1BGJxsv5irNvH1vIm8PX9US
Gn5rOcM5chILBftBsnXlQ+iefUBztZd8MHw4p4q86n0KBpDxgxL+jsaktb3KYNF+
Rkn24o+O80gR06gwiJBK2O/5RP9h3APBHDnDMsVeXmfuO7aimi9fEYQ163/sXvq0
FMiTLYIQUo/RhThKVu/MRs2QXsE+HN+n3je8yiX2Y8nAfIXLIhPhAoL+NKfDaG6M
0moSGiJc/qqAbK+gsL6UsDMxJmLqq+ATiC0tqh+GPt93kyJvxyVpMT4YF5lw6XnI
2HId0qJd1DhW/cfQXnuHbAXUDHgpOyht9JpA8onG33LEWWyusXHw4vd3Pznj/HE5
CDzm+IC9EXeNTY99nU4GcZlMg7gpv2croB5PkyLyNjQSoi3W2RpE3cEbMfTZnnvf
IXrr8BukWFmn+Da0LlU6
=SHwM
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=u0y5
-----END PGP SIGNATURE-----