-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0971
                          fuseiso security update
                               18 April 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           fuseiso
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Denial of Service               -- Remote with User Interaction
                   Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-8837 CVE-2015-8836 

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3551

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running fuseiso check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3551-1                   security@debian.org
https://www.debian.org/security/                           Florian Weimer
April 16, 2016                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : fuseiso
CVE ID         : CVE-2015-8836 CVE-2015-8837
Debian Bug     : 779047

It was discovered that fuseiso, a user-space implementation of the
ISO 9660 file system based on FUSE, contains several vulnerabilities.

CVE-2015-8836

    A stack-based buffer overflow may allow attackers who can trick a
    user into mounting a crafted ISO 9660 file system to cause a
    denial of service (crash), or, potentially, execute arbitrary
    code.

CVE-2015-8837

    An integer overflow leads to a heap-based buffer overflow, which
    allows an attacker (who can trick a user into mounting a crafted
    ISO 9660 file system) to cause a denial of service (crash), or,
    potentially, execute arbitrary code.

For the oldstable distribution (wheezy), these problems have been fixed
in version 20070708-3+deb7u1.

The stable distribution (jessie) does not contain fuseiso packages.

For the unstable distribution (sid), these problems have been fixed in
version 20070708-3.2.

We recommend that you upgrade your fuseiso packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJXErPjAAoJEL97/wQC1SS+kqkH/iCNtJvHRqaf2Zj11ohCUOEl
JtplOpw8m/JCshpoR+lBAHEnI+ZNA0go2bNGYbhOYzHvIMR3w5G9YTEMxMzZq6Ax
ZY/Zr1/QnOLfkTZONvXfAjZ0k4XvHUllQ8YOf+/mekiwGDTd0cC5BJDI0QinUmHO
vXJ6SZnkinzIASoXiqtaZk1JE8VIQa3VCCShgceaYw1MhVMx+UiWHcAkSFmnMNHj
pwerdaB9nFFWH7qtrD9oTOSwql8TktomenmBlEZpDrH391bqqs6VuQmT1/40rWg9
RWFvMEGnNIarJ9QmmdPeGm8nyFVmItJ3327fxXF45TI5FkXfgjy6IcF0gu1SvUg=
=Bh5j
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=xX/H
-----END PGP SIGNATURE-----