-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1222
                         xerces-c security update
                                17 May 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           xerces-c
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-2099  

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3579

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running xerces-c check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3579-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
May 16, 2016                          https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : xerces-c
CVE ID         : CVE-2016-2099
Debian Bug     : 823863

Gustavo Grieco discovered an use-after-free vulnerability in xerces-c, a
validating XML parser library for C++, due to not properly handling
invalid characters in XML input documents in the DTDScanner.

For the stable distribution (jessie), this problem has been fixed in
version 3.1.1-5.1+deb8u2.

For the testing distribution (stretch), this problem has been fixed
in version 3.1.3+debian-2.

For the unstable distribution (sid), this problem has been fixed in
version 3.1.3+debian-2.

We recommend that you upgrade your xerces-c packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=D1tG
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=I933
-----END PGP SIGNATURE-----