-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0242
                          prosody security update
                              1 February 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           prosody
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Provide Misleading Information -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-0756  

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3463

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running prosody check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3463-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 31, 2016                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : prosody
CVE ID         : CVE-2016-0756

It was discovered that insecure handling of dialback keys may allow
a malicious XMPP server to impersonate another server.

For the oldstable distribution (wheezy), this problem has been fixed
in version 0.8.2-4+deb7u4.

For the stable distribution (jessie), this problem has been fixed in
version 0.9.7-2+deb8u3.

For the unstable distribution (sid), this problem has been fixed in
version 0.9.10-1.

We recommend that you upgrade your prosody packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=bLSK
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=B8p4
-----END PGP SIGNATURE-----