-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2016.1941.2
    Multiple vulnerabilities have been identified in F5 BIG-IP products
                             9 September 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          F5 BIG-IP products
Publisher:        F5 Networks
Operating System: Network Appliance
                  Virtualisation
Impact/Access:    Increased Privileges     -- Existing Account      
                  Create Arbitrary Files   -- Remote/Unauthenticated
                  Denial of Service        -- Remote/Unauthenticated
                  Access Confidential Data -- Existing Account      
Resolution:       Patch/Upgrade
CVE Names:        CVE-2016-5736 CVE-2016-1497 CVE-2015-8022

Reference:        https://support.f5.com/kb/en-us/solutions/public/k/31/sol31925518.html
                  https://support.f5.com/kb/en-us/solutions/public/k/10/sol10133477.html
                  https://support.f5.com/kb/en-us/solutions/public/k/12/sol12401251.html

Revision History: September  9 2016: Removed F5 MobileSafe and WebSafe from affected products for CVE-2016-5736
                  August    11 2016: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

sol31925518: BIG-IP APM access logs vulnerability CVE-2016-1497

Security Advisory

Original Publication Date: 08/10/2016

Vulnerability Description

A vulnerability in the BIG-IP Configuration utility can be used by an 
unauthorized BIG-IP administrative user to gain unauthorized access to the 
Access Policy Manager (APM) access logs. This vulnerability requires valid 
user account credentials and access to the Configuration utility. This flaw 
exists when APM is configured, and exposes session details within the access 
logs. If the BIG-IP APM system is not in use, the vulnerability still exists;
however, there is no data stored in the log files in question when the BIG-IP
APM system is not actively in use. (CVE-2016-1497)

Impact

An unauthorized user might gain access to APM access logs.

Security Issue Status

F5 Product Development has assigned ID 539923 to this vulnerability, and has 
evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product                         Versions known to be vulnerable    Versions known to be not vulnerable    Severity        Vulnerable component or feature
BIG-IP LTM                      12.0.0                             12.0.0 HF1                             High            Configuration utility
                                11.0.0 - 11.6.0                    11.6.1
                                                                   11.5.4 HF2
								   11.4.1 HF10
								   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP AAM                      12.0.0                             12.0.0 HF1                             High            Configuration utility
                                11.0.0 - 11.6.0                    11.6.1
                                                                   11.5.4 HF2
								   11.4.1 HF10
								   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP AFM                      12.0.0                             12.0.0 HF1                             High            Configuration utility
                                11.0.0 - 11.6.0                    11.6.1
                                                                   11.5.4 HF2
								   11.4.1 HF10
								   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP Analytics                12.0.0                             12.0.0 HF1                             High            Configuration utility
                                11.0.0 - 11.6.0                    11.6.1
                                                                   11.5.4 HF2
								   11.4.1 HF10
								   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP APM                      12.0.0                             12.0.0 HF1                             High            Configuration utility
                                11.0.0 - 11.6.0                    11.6.1
                                                                   11.5.4 HF2
								   11.4.1 HF10
								   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP ASM                      12.0.0                             12.0.0 HF1                             High            Configuration utility
                                11.0.0 - 11.6.0                    11.6.1
                                                                   11.5.4 HF2
								   11.4.1 HF10
								   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP DNS                      12.0.0                             12.0.0 HF1                             High            Configuration utility
BIG-IP Edge Gateway             11.0.0 - 11.3.0                    11.2.1 HF16                            High            Configuration utility
                                                                   10.1.0 - 10.2.4
BIG-IP GTM                      11.0.0 - 11.6.0                    11.6.1                                 High            Configuration utility
                                                                   11.5.4 HF2
								   11.4.1 HF10
								   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP Link Controller          12.0.0                             12.0.0 HF1                             High            Configuration utility
                                11.0.0 - 11.6.0                    11.6.1
                                                                   11.5.4 HF2
								   11.4.1 HF10
								   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP PEM                      12.0.0                             12.0.0 HF1                             High            Configuration utility
                                11.0.0 - 11.6.0                    11.6.1
                                                                   11.5.4 HF2
								   11.4.1 HF10
								   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP PSM                      11.0.0 - 11.4.1                    11.4.1 HF10                            High            Configuration utility
                                                                   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP WebAccelerator           11.0.0 - 11.3.0                    11.2.1 HF16                            High            Configuration utility
                                                                   10.1.0 - 10.2.4
BIG-IP WOM                      11.0.0 - 11.3.0                    11.2.1 HF16                            High            Configuration utility
                                                                   10.1.0 - 10.2.4
ARX                             None                               6.2.0 - 6.4.0                          Not vulnerable  None
Enterprise Manager              None                               3.0.0 - 3.1.1                          Not vulnerable  None
FirePass                        None                               7.0.0                                  Not vulnerable  None
                                                                   6.0.0 - 6.1.0
BIG-IQ Cloud                    None                               4.0.0 - 4.5.0                          Not vulnerable  None
BIG-IQ Device                   None                               4.2.0 - 4.5.0                          Not vulnerable  None
BIG-IQ Security                 None                               4.0.0 - 4.5.0                          Not vulnerable  None
BIG-IQ ADC                      None                               4.5.0                                  Not vulnerable  None
BIG-IQ Centralized Management   None                               4.6.0                                  Not vulnerable  None
BIG-IQ Cloud and Orchestration  None                               1.0.0                                  Not vulnerable  None
LineRate                        None                               2.5.0 - 2.6.1                          Not vulnerable  None
F5 WebSafe                      None                               1.0.0                                  Not vulnerable  None
Traffix SDC                     None                               4.0.0 - 4.4.0                          Not vulnerable  None
                                                                   3.3.2 - 3.5.1


Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable 
column, you can eliminate this vulnerability by upgrading to a version listed
in the Versions known to be not vulnerable column. If the table lists only an
older version than what you are currently running, or does not list a 
non-vulnerable version, then no upgrade candidate currently exists.

Supplemental Information

    SOL9970: Subscribing to email notifications regarding F5 products

    SOL9957: Creating a custom RSS feed to view new and updated documents

    SOL4602: Overview of the F5 security vulnerability response policy

    SOL4918: Overview of the F5 critical issue hotfix policy

    SOL167: Downloading software and firmware from F5

    SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)

    SOL10025: Managing BIG-IP product hotfixes (10.x)

    SOL9502: BIG-IP hotfix matrix

- ---

sol10133477: BIG-IP IPsec IKE peer listener vulnerability CVE-2016-5736

Security Advisory

Original Publication Date: 08/10/2016

Updated Date: 08/10/2016

Vulnerability Description

The anonymous IPsec IKE peer configuration object is present and enabled in 
the default configuration. The settings of the anonymous IPsec IKE peer object
allow an arbitrary peer to establish IKE phase 1 without certificate 
validation or a pre-shared key which may expose phase 2 negotiations to a 
brute force attack. (CVE-2016-5736)

Impact

For BIG-IP systems configured with IPsec tunnels, the default anonymous IPsec
IKE peer configuration can allow a remote attacker to cause a 
denial-of-service (DoS) attack or inject traffic into local networks.

Security Issue Status

F5 Product Development has assigned ID 570716 (BIG-IP) to this vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product                         Versions known to be vulnerable    Versions known to be not vulnerable    Severity        Vulnerable component or feature
BIG-IP LTM                      12.0.0 - 12.0.0 HF1                12.1.0                                 Severe          IPsec IKE peer listener
                                11.6.0                             12.0.0 HF2
                                11.4.0 - 11.5.4 HF1                11.6.1
				11.2.1 - 11.2.1 HF15               11.5.4 HF2
                                				   11.2.1 HF16
								   10.2.1 - 10.2.4
BIG-IP AAM                      12.0.0 - 12.0.0 HF1                12.1.0                                 Severe          IPsec IKE peer listener
                                11.6.0                             12.0.0 HF2
                                11.4.0 - 11.5.4 HF1                11.6.1
                                				   11.5.4 HF2
BIG-IP AFM                      12.0.0 - 12.0.0 HF1                12.1.0                                 Severe          IPsec IKE peer listener
                                11.6.0                             12.0.0 HF2
                                11.4.0 - 11.5.4 HF1                11.6.1
                                				   11.5.4 HF2
BIG-IP Analytics                12.0.0 - 12.0.0 HF1                12.1.0                                 Severe          IPsec IKE peer listener
                                11.6.0                             12.0.0 HF2
                                11.4.0 - 11.5.4 HF1                11.6.1
				11.2.1 - 11.2.1 HF15               11.5.4 HF2
                                				   11.2.1 HF16
BIG-IP APM                      12.0.0 - 12.0.0 HF1                12.1.0                                 Severe          IPsec IKE peer listener
                                11.6.0                             12.0.0 HF2
                                11.4.0 - 11.5.4 HF1                11.6.1
				11.2.1 - 11.2.1 HF15               11.5.4 HF2
                                				   11.2.1 HF16
								   10.2.1 - 10.2.4
BIG-IP ASM                      12.0.0 - 12.0.0 HF1                12.1.0                                 Severe          IPsec IKE peer listener
                                11.6.0                             12.0.0 HF2
                                11.4.0 - 11.5.4 HF1                11.6.1
				11.2.1 - 11.2.1 HF15               11.5.4 HF2
                                				   11.2.1 HF16
								   10.2.1 - 10.2.4
BIG-IP DNS                      12.0.0 - 12.0.0 HF1                12.1.0                                 Severe          IPsec IKE peer listener
                                                                   12.0.0 HF2
BIG-IP Edge Gateway             11.2.1 - 11.2.1 HF15               11.2.1 HF16                            Severe          IPsec IKE peer listener
                                                                   10.2.1 - 10.2.4
BIG-IP GTM                      11.6.0                             11.6.1                                 Severe          IPsec IKE peer listener
                                11.4.0 - 11.5.4 HF1                11.5.4 HF2
                                11.2.1 - 11.2.1 HF15               11.2.1 HF16
                                				   10.2.1 - 10.2.4
BIG-IP Link Controller          12.0.0 - 12.0.0 HF1                12.1.0                                 Severe          IPsec IKE peer listener
                                11.6.0                             12.0.0 HF2
                                11.4.0 - 11.5.4 HF1                11.6.1
				11.2.1 - 11.2.1 HF15               11.5.4 HF2
                                				   11.2.1 HF16
								   10.2.1 - 10.2.4
BIG-IP PEM                      12.0.0 - 12.0.0 HF1                12.1.0                                 Severe          IPsec IKE peer listener
                                11.6.0                             12.0.0 HF2
                                11.4.0 - 11.5.4 HF1                11.6.1
                                				   11.5.4 HF2
BIG-IP PSM                      11.4.0 - 11.4.1                    10.2.1 - 10.2.4                        Severe          IPsec IKE peer listener
BIG-IP WebAccelerator           11.2.1 - 11.2.1 HF15               11.2.1 HF16                            Severe          IPsec IKE peer listener
                                                                   10.2.1 - 10.2.4
BIG-IP WOM                      11.2.1 - 11.2.1 HF15               11.2.1 HF16                            Severe          IPsec IKE peer listener
                                                                   10.2.1 - 10.2.4
ARX                             None                               6.2.0 - 6.4.0                          Not vulnerable  None
Enterprise Manager              None                               3.1.1                                  Not vulnerable  None
FirePass                        None                               7.0.0                                  Not vulnerable  None
BIG-IQ Cloud                    None                               4.0.0 - 4.5.0                          Not vulnerable  None
BIG-IQ Device                   None                               4.2.0 - 4.5.0                          Not vulnerable  None
BIG-IQ Security                 None                               4.0.0 - 4.5.0                          Not vulnerable  None
BIG-IQ ADC                      None                               4.5.0                                  Not vulnerable  None
BIG-IQ Centralized Management   None                               5.0.0                                  Not vulnerable  None
                                                                   4.6.0
BIG-IQ Cloud and Orchestration  None                               1.0.0                                  Not vulnerable  None
F5 iWorkflow                    None                               2.0.0                                  Not vulnerable  None
LineRate                        None                               2.5.0 - 2.6.1                          Not vulnerable  None
Traffix SDC                     None                               5.0.0                                  Not vulnerable  None
                                                                   4.0.0 - 4.4.0

Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable 
column, you can eliminate this vulnerability by upgrading to a version listed
in the Versions known to be not vulnerable column. If the table lists only an
older version than what you are currently running, or does not list a 
non-vulnerable version, then no upgrade candidate currently exists.

To mitigate this vulnerability, you can disable the anonymous IPsec IKE peer 
listener (if not in use). However, if you want to use the anonymous listener,
you should ensure that the Verify Certificate option is enabled, or configure
the Authentication Method option to use the Preshared Key method if 
certificates are not in use. To do so, perform the following procedures:

Disabling the anonymous IPsec IKE peer listener

Enabling the Verify Certificate option for the anonymous IPsec IKE peer 
listener

Configuring the Authentication Method option to use the Preshared Key method 
for the anonymous IPsec IKE peer listener

Disabling the anonymous IPsec IKE peer listener

Impact of action: The BIG-IP system will no longer listen for IPsec IKE peers
unless another peer listener has been configured.

1. Log in to the Configuration utility.

2. Navigate to Network > IPsec > IKE Peers.

3. Select the anonymous IKE peer.

4. For the State option, select Disabled.

5. Click Update.

Enabling the Verify Certificate option for the anonymous IPsec IKE peer 
listener

Impact of action: IPsec IKE peers will be required to provide a valid 
certificate or negotiation will fail.

1. Log in to the Configuration utility.

2. Navigate to Network > IPsec > IKE Peers.

3. Select the anonymous IKE peer.

4. In the IKE Phase 1 Credentials section, select the Verify Peer Certificate
check box.

Enabling the Verify Peer Certificate option allows you to configure the 
following:

- - Trusted Certificate Authorities

- - Certificate Revocation List (CRL)

- - Peer Certificate

5. Click Update.

Configuring the Authentication Method option to use the Preshared Key method 
for the anonymous IPsec IKE peer listener

Impact of action: IPsec IKE peers will be required to provide the specified 
preshared key or negotiation will fail.

1. Log in to the Configuration utility.

2. Navigate to Network > IPsec > IKE Peers.

3. Select the anonymous IKE peer.

4. In the IKE Phase 1 Credentials section, select Preshared Key for the 
Authentication Method option.

Selecting the Preshared Key method provides following fields:

- - Preshared Key

- - Verify Preshared Key

5. In the Preshared Key field, enter the string that IKE peers will share for
authenticating each other.

6. In the Verify Preshared Key field, re-enter the string that IKE peers will
share for authenticating each other.

7. Click Update.

Supplemental Information

    SOL9970: Subscribing to email notifications regarding F5 products

    SOL9957: Creating a custom RSS feed to view new and updated documents

    SOL4602: Overview of the F5 security vulnerability response policy

    SOL4918: Overview of the F5 critical issue hotfix policy

    SOL167: Downloading software and firmware from F5

    SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)

- ---

sol12401251: BIG-IP file validation vulnerability CVE-2015-8022

Security Advisory

Original Publication Date: 08/10/2016

Updated Date: 08/10/2016

Vulnerability Description

The BIG-IP Configuration utility may not properly validate file type or 
contents where uploaded files are allowed in the Access Policy Manager 
customization configuration section. (CVE-2015-8022)

Impact

An authenticated attacker may upload files to the BIG-IP system. Privilege 
escalation may potentially occur when attackers authenticate with at least 
Application Editor privileges.

Security Issue Status

F5 Product Development has assigned ID 472093 (BIG-IP) to this vulnerability,
and has evaluated the currently supported releases for potential 
vulnerability.

To determine if your release is known to be vulnerable, the components or 
features that are affected by the vulnerability, and for information about 
releases or hotfixes that address the vulnerability, refer to the following 
table:

Product                         Versions known to be vulnerable    Versions known to be not vulnerable    Severity        Vulnerable component or feature
BIG-IP LTM                      11.6.0                             12.0.0 - 12.1.0                        High            Configuration utility
                                11.5.0 - 11.5.3                    11.6.1
                                11.3.0 - 11.4.1 HF9                11.5.4
				11.0.0 - 11.2.1 HF15               11.4.1 HF10
                                				   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP AAM                      11.6.0                             12.0.0 - 12.1.0                        High            Configuration utility
                                11.5.0 - 11.5.3                    11.6.1
                                11.4.0 - 11.4.1 HF9                11.5.4
				                                   11.4.1 HF10
BIG-IP AFM                      11.6.0                             12.0.0 - 12.1.0                        High            Configuration utility
                                11.5.0 - 11.5.3                    11.6.1
                                11.3.0 - 11.4.1 HF9                11.5.4
                                				   11.4.1 HF10
BIG-IP Analytics                11.6.0                             12.0.0 - 12.1.0                        High            Configuration utility
                                11.5.0 - 11.5.3                    11.6.1
                                11.3.0 - 11.4.1 HF9                11.5.4
				11.0.0 - 11.2.1 HF15               11.4.1 HF10
                                				   11.2.1 HF16
BIG-IP APM                      11.6.0                             12.0.0 - 12.1.0                        High            Configuration utility
                                11.5.0 - 11.5.3                    11.6.1
                                11.3.0 - 11.4.1 HF9                11.5.4
				11.0.0 - 11.2.1 HF15               11.4.1 HF10
				                                   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP ASM                      11.6.0                             12.0.0 - 12.1.0                        High            Configuration utility
                                11.5.0 - 11.5.3                    11.6.1
                                11.3.0 - 11.4.1 HF9                11.5.4
				11.0.0 - 11.2.1 HF15               11.4.1 HF10
                                				   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP DNS                      None                               12.0.0 - 12.1.0                        Not vulnerable  None
BIG-IP Edge Gateway             11.3.0                             11.2.1 HF16                            High            Configuration utility
                                11.0.0 - 11.2.1 HF15               10.1.0 - 10.2.4
BIG-IP GTM                      11.6.0                             11.6.1                                 High            Configuration utility
                                11.5.0 - 11.5.3                    11.5.4
                                11.3.0 - 11.4.1 HF9                11.4.1 HF10
				11.0.0 - 11.2.1 HF15               11.2.1 HF16
                                				   10.1.0 - 10.2.4
BIG-IP Link Controller          11.6.0                             12.0.0 - 12.1.0                        High            Configuration utility
                                11.5.0 - 11.5.3                    11.6.1
                                11.3.0 - 11.4.1 HF9                11.5.4
				11.0.0 - 11.2.1 HF15               11.4.1 HF10
                                				   11.2.1 HF16
								   10.1.0 - 10.2.4
BIG-IP PEM                      11.6.0                             12.0.0 - 12.1.0                        High            Configuration utility
                                11.5.0 - 11.5.3                    11.6.1
                                11.3.0 - 11.4.1 HF9                11.5.4
                                11.4.1 HF10
BIG-IP PSM                      11.3.0 - 11.4.1 HF9                11.4.1 HF10                            High            Configuration utility
                                11.0.0 - 11.2.1 HF15               11.2.1 HF16
                                                                   10.1.0 - 10.2.4
BIG-IP WebAccelerator           11.3.0                             11.2.1 HF16                            High            Configuration utility
                                11.0.0 - 11.2.1 HF15               10.1.0 - 10.2.4
BIG-IP WOM                      11.3.0                             11.2.1 HF16                            High            Configuration utility
                                11.0.0 - 11.2.1 HF15               10.1.0 - 10.2.4
ARX                             None                               6.2.0 - 6.4.0                          Not vulnerable  None
Enterprise Manager              None                               3.1.1                                  Not vulnerable  None
FirePass                        None                               7.0.0                                  Not vulnerable  None
BIG-IQ Cloud                    None                               4.0.0 - 4.5.0                          Not vulnerable  None
BIG-IQ Device                   None                               4.2.0 - 4.5.0                          Not vulnerable  None
BIG-IQ Security                 None                               4.0.0 - 4.5.0                          Not vulnerable  None
BIG-IQ ADC                      None                               4.5.0                                  Not vulnerable  None
BIG-IQ Centralized Management   None                               5.0.0                                  Not vulnerable  None
BIG-IQ Cloud and Orchestration  None                               1.0.0                                  Not vulnerable  None
LineRate                        None                               2.5.0 - 2.6.1                          Not vulnerable  None
F5 MobileSafe                   **                                 **                                     **              **
F5 WebSafe                      **                                 **                                     **              **
Traffix SDC                     None                               5.0.0                                  Not vulnerable  None
                                                                   4.0.0 - 4.4.0


** Confirmation of vulnerability or non-vulnerability is not presently 
available. F5 is still researching the issue for the products indicated, and 
will update this article with the most current information as soon as it has 
been confirmed. F5 Technical Support does not have any additional information
on this issue.

Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable 
column, you can eliminate this vulnerability by upgrading to a version listed
in the Versions known to be not vulnerable column. If the table lists only an
older version than what you are currently running, or does not list a 
non-vulnerable version, then no upgrade candidate currently exists.

This vulnerability exists regardless of the provisioning level configured for
BIG-IP APM and is only exploitable by an authenticated user. To mitigate this
vulnerability, you should permit management access to F5 products only over a
secure network and limit shell access to only trusted users. For more 
information, refer to SOL13309: Restricting access to the Configuration 
utility by source IP address (11.x - 12.x) and SOL13092: Overview of securing
access to the BIG-IP system.

Acknowledgements

F5 would like to acknowledge Pedro Worcel for bringing this issue to our 
attention, and for following the highest standards of responsible disclosure.

Supplemental Information

    SOL9970: Subscribing to email notifications regarding F5 products

    SOL9957: Creating a custom RSS feed to view new and updated documents

    SOL4602: Overview of the F5 security vulnerability response policy

    SOL4918: Overview of the F5 critical issue hotfix policy

    SOL167: Downloading software and firmware from F5

    SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBV9IC7Yx+lLeg9Ub1AQgfBg/9FTx0jWTMMhY5BI1Dk2an0DXcizLfZMOG
TVXPXb4vcEYPOkShVdHdtOV58O6EDHnzkFSPJUlwMhnAS8O3mPIOjqknG74gy19Y
RNGu4oc7Qrm3kDqsbxjsXc7Smm7KiXFdGXHY/BrYWG6FkDMqPakpNr+geKm2j5gM
dEfNGKeQP87V5KDGffNDJNrl7MpPbYDOvwZi4sPKK0GFpXwcEbjNkp51+pV0yr/T
r3IBRkUGMkUIHHSwB8piafl0BMXCv5XowrWVWtVjOTgLNSQVAzVxN5OOlalDc8P6
t9i04kbhoss82q1DstgE1+iR0ix3SzzmCmGtDxIaZykCFXTGEjpXAgbUinXzcg+A
HjZWWauCLHHD7E+LB4D/S8lXlx0BwpNFyIVih4faemuKEfxFc1IF/sdHpErfBz6d
glEAFVw0JTqbrZ76CGUSSHz45eoXmN6C8n1T+6G4wp7t79A2lRMxzZ9GjaqscJ9Y
cYAfRqh6RKUJ+bDJxZHUCWXIZHc6kKOVYVhnYNQwt6rFi0eEwlgsxfub5kORrVgf
YcqFRXbrZ0coeTT93XjVrENvMwH5jhhPTJv0bJShFMFTl1O0FCyiZBTEcisYDU6P
YiGNiTv+1+1iIKu5g82BqyifmI5D6BWtuTkHBT6cDxg/Ge4MVBHbHVQh6uPHomyX
TisRm9R5afQ=
=XZ3m
-----END PGP SIGNATURE-----