-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0093
                         isc-dhcp security update
                              14 January 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           isc-dhcp
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   Debian GNU/Linux 8
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-8605  

Reference:         ESB-2016.0092

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3442

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3442-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
January 13, 2016                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : isc-dhcp
CVE ID         : CVE-2015-8605
Debian Bug     : 810875

It was discovered that a maliciously crafted packet can crash any of
the isc-dhcp applications.  This includes the DHCP client, relay, and
server application.  Only IPv4 setups are affected.

For the oldstable distribution (wheezy), this problem has been fixed
in version 4.2.2.dfsg.1-5+deb70u8.

For the stable distribution (jessie), this problem has been fixed in
version 4.3.1-6+deb8u2.

For the testing (stretch) and unstable (sid) distributions, this
problem will be fixed soon.

We recommend that you upgrade your isc-dhcp packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQQcBAEBCgAGBQJWlkaAAAoJELjWss0C1vRzsbMf/jnP/y8lv3v2wQKan7wkkLQb
1aGma58iIpvrM22SCX6jfZ+kCwdwB3pbcBVKTg6jO8J6D461CnlSBePYEf448uKu
srXcdW2A8oeoUMpWPAKIvbP9mhwWXO3vyZHB4GTZimIvq4Zi65bpX7V0MmWV1fVl
nHc52KYzjCwCk3ha9GrZdcEh8Ur4gAhK+iUHS7dcg37r2nLISob/nyHTTUgD4DjK
MM0XBNfpWpXP3kQuUiYVf4HKl3aAZnHRoisT9/t+ZAkPUrqZmvAWsQ/RQeC197yY
lVJwBUyXGQbMM5xQ+TY2qbW2UDPpYBIArKzWL0oklKTJWoc908qi45y3Hj76ImKM
M0F3TjZ0CNtFhhSPn4XN/zBiyTiyYpH9fnPN0H+A59kuiolGhrVcX/lKc7mUEZCp
epcKKQClvCSELPUtGsO5S6GH6jBRLm5I/zYMB4CJVMqgGW4pi2Ep2sUrRMDxpkHA
pqc4sO2JiPd2T1zIRsCCujaiPHC6w8X1bq4ZVI596/yunk6X/sGloeQjwyfn5IFo
IKfFgSPRFocwMpa1XCyjc5+2/55kvh1UAaPjMW5Cc0607ktaAjvpAXprD/denlt1
kGqZPgD7vS+rl/41e9+Zn68HEp2kOdtrK41vlAITVUXZrRuXCEPDuQryOT09lsnz
Jgop0E0mogtZqS/4N7bQ5ViBdoRikvAHj/oMmwIhCXzsQUfhk7xO5lIgjgXKdNLt
9li67asHdartgkGtEpTkNyYn67CKnbjNYAU3IpO2B0pkiQUQ8IwmZEVStOMda59K
igvt/D+5rOS0CiB6IkTIeNJrw+G6lEtJs0uoTr8MG+aLafmzx87D/iQ2RhlMHzar
mqLMAZcHLjTtFaMCtOqSL1SBki1EsLecltE9VMx/oyeNYbglnWX8feJeW0X+DgC5
J+B4Pz2hhgRndnRdyNkG04tPB/NMMu4syoqr4Mhn+uHepBjAracD38LZYnBkFgas
MCsfNlAIAjeXcMrVApGU46/1vITJfHrqmE8ZZ2J9wa4NG4GibVfY9K5Tyo+UHlqS
s3PINEd7yWn6i0rCDFYW19O+uHuEkC+6mIhLCjMrFqTw7Kw2fixDnCH9bCjshsbi
9MlcRqpGruq8bsR8PL9sMo5eJpr/lVqr0E4qTD1IN/jq9Cwezp6OWmJd0HDHBkaD
ktcJkxVgxhezKVpDXZXCzyDtnX8hZkURXSwoMW0pvAbuoKHCbgbAjQPMwAYrwIcl
xD0PNXk0ba5ej7XlMoSaCNTafuj5mBgxe2UNZ5noK0A+uC8m6z99Ww+0/bIcZW3W
HUQtxnuXreBYJ3VXoStsPs1DZ8y2/Y0X6YLH4xQq5hXhJOWx3x8dgp7hvgCmlEQ=
=7PE2
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=/mc8
-----END PGP SIGNATURE-----