-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0883
                          optipng security update
                               8 April 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           optipng
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   Debian GNU/Linux 8
                   Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-2191 CVE-2015-7801 

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3546

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running optipng check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3546-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
April 07, 2016                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : optipng
CVE ID         : CVE-2016-2191

Hans Jerry Illikainen discovered that missing input sanitising in the
BMP processing code of the optipng PNG optimiser may result in denial of
service or the execution of arbitrary code if a malformed file is
processed.

For the oldstable distribution (wheezy), this problem has been fixed
in version 0.6.4-1+deb7u2. This update also fixes CVE-2015-7801, which
was originally targeted for a wheezy point update.

For the stable distribution (jessie), this problem has been fixed in
version 0.7.5-1+deb8u1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your optipng packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=pI31
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVwcfnn6ZAP0PgtI9AQKVXBAAquEb+ZbhlPntJqM0r+nIRBikzFJNKIvL
RZXxYkkHyEbsBbC0qHenbwWeWm/8B9c/sgsO/ha48pW5HfzYZFIg8kGBUIQnL07j
9Gp9SUe7Eh8wVDY9fRDEZZmR9uXCvXAZao9S4nn6wLgNv3ibWWpoJzJYhrGA/4OU
l7o9Lh7nUkkZwiug1iWwDEmPHDXsWx7a0lG3A3r4o5QLdafha2HeMDzdO3JV/Kky
dX8yD6x3A7RmNzElS547tN4pHTQsPye5YLqd511z5ns/02j+MuaYrPLpzXDUFpw4
iipxaCDwf8SC3ylPPRO9gBnulBO+A7ufC9AicNZvIXpKumJM87zjZEZzNtT8n7y+
QqMTrSCTsJl8YJZ6M68bA0fC8rTNsL1LyXuRPjjQOKGMssxur2KscTryg5C4+Tau
12CObDVLi8I7UFKmab5+RIVMLAH/pPxuXurOxUS/p3BNo/X2q0tFu0zx0wUErOTx
iVzbtQnhqndBZaweOIPmLUraxI4CWE3lF4nYmn5Bs4pwCf/Fv1lwHxByhHR4DD1o
W/O8NOdevpfl2QmXe6+A2wlsOflFcsEvtOptA76f8NYdJZAQAHKEJFuanPg+mo+4
DzO+2JB2SgZqjPCjUhfMIOaOLlF0YgcFBJsKuxrb2OryyfZa7yPyOUUyrCG0ch6B
CEiRPw9RcUY=
=M6Vq
-----END PGP SIGNATURE-----