Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.2057 tryton-server security update 31 August 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: tryton-server Publisher: Debian Operating System: Debian GNU/Linux 8 Linux variants OpenBSD Impact/Access: Access Privileged Data -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2016-1242 CVE-2016-1241 Original Bulletin: http://www.debian.org/security/2016/dsa-3656 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running tryton-server check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3656-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff August 30, 2016 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : tryton-server CVE ID : CVE-2016-1241 CVE-2016-1242 Two vulnerabilities have been discovered in the server for the Tryton application platform, which may result in information disclosure of password hashes or file contents. For the stable distribution (jessie), these problems have been fixed in version 3.4.0-3+deb8u2. For the unstable distribution (sid), these problems have been fixed in version 4.0.4-1. We recommend that you upgrade your tryton-server packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJXxfK1AAoJEBDCk7bDfE42y5cP/33eOPyaBiNdpE2FwVksHc0/ ATAzg2Q1VlqqPpHGhTcJ7r1sCv+bp6KeO9+cHgJRb2+MJih4ae3hIvYPVd6HE5iE 8JaWdR6LSlkz/OJu0HQuOuG1tM/3KGym24ZmkZOkhPEu29nsbNZ920w1iMZ34/Jw ROYTv8I57cNEP6jB902kPod/BE67cZQy97EGi0CJoUDA8Thd6DrEXWbLO7TJGE+d BdQlfpHG8oGusJkrGFnjiXZiGrSVwqyAY60Ybqs6kpv6HyZk1FAvAIQKvp2zcDAH JqDI9+L/LlenAZINBgWa+zj2Zl8sd6ltKqe1P6GUGTbQWLB5Q3fIeVyqRNH89cWm cdxsrpenwsuhJF4IcilRcAFpzdIQaoyN8AaGplyluD243tcTs7p6eVQownMacjGT RpL5dUWFSW2G5jK/YKWpcO2gsZP2PAa6UFHM2xUPGjA5FwneqsoDQZGJttU4gDik uXM6jNVEtEAKAFweFVmCc0qdp48phtLE8WoS0sxkkKpgs3gX7ncORH70/SzdOT9j qwjYuNwl8CjjOQ4o6ELpkA/+yozDOXTsGv0+nWKhP5fpHYa2G2s7JWxXjQpI7H35 s8chSSekEBv38q8eeTTtccCjxSWV2R8Oww3XWzbVrIve8GXtlqrsp67YT2V6351I 7BehuaiMJoB4W/WRQOaX =b8/Y - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBV8Y1/ox+lLeg9Ub1AQi9KA//W7VYZ0weFsX3Wfoh0VYTBW28qlgnMsiy ctM+QlIs6M4iLOTen0FTkETv1q0ohfsNJ80pLZck7UqSKSIo375XBWhe1RFUUG1c 0wbQsNYfI27Wqz9UQI8mabF7uwkcix79EXUsREeqZJF7JTP3hTSBfTC8dVNJNWRC BH+/TGq8xUQYRbS/+0msR64nnxZzR5Rhlg9aSBecRZw9r7XtsW9FpA5wvYu4zcy4 L6hJ3jwohC8k8ctgq1bNopfjFlypyQfMaTPLh8N8Th0egnOUsk535E/+BL1/maVs 6X99RpWFGefdMk9kQRaI11vgqnYONJjqS5LpeK91L28dOsmYv8Yhzef3rFiUM3M5 7WgTTApSRDIouuf4EPRA2MHwC3TOPYD26fDxNPol6hAQEdjmqK+ulYkotTuqKwN6 OPrXAeyc1ZojxHeKQwLKUPkIHdO1soatkRic5ojurHzATwIBS+ZMQaRrYyJa3k8L MAoUEB4E0jxtFPt/OLHY/b4gQolHmBrOKTTwAIhR0C3EB9peSDH2k3hNZz9neEuv jUe8P2gja7k2AGaqLVtB10E+hKXAHSiEm9NwlXjWddh/0BWF++VTdb404XcjE25P qGSCAKlTYWG/OVnOo3fgJ0H8Cq+YTibdLVQDGqzlFH2SxiG9STmpzu7KP/hrm90A +HJZDl4ohDw= =A5Zb -----END PGP SIGNATURE-----