-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1168
                     Important: jasper security update
                                10 May 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           jasper
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 6
                   Red Hat Enterprise Linux WS/Desktop 6
                   Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-10251 CVE-2016-10249 CVE-2016-10248
                   CVE-2016-9600 CVE-2016-9591 CVE-2016-9583
                   CVE-2016-9560 CVE-2016-9394 CVE-2016-9393
                   CVE-2016-9392 CVE-2016-9391 CVE-2016-9390
                   CVE-2016-9389 CVE-2016-9388 CVE-2016-9387
                   CVE-2016-9262 CVE-2016-8885 CVE-2016-8884
                   CVE-2016-8883 CVE-2016-8693 CVE-2016-8692
                   CVE-2016-8691 CVE-2016-8690 CVE-2016-8654
                   CVE-2016-2116 CVE-2016-2089 CVE-2016-1867
                   CVE-2016-1577 CVE-2015-5221 CVE-2015-5203

Reference:         ASB-2016.0042
                   ESB-2017.0921
                   ESB-2017.0057
                   ESB-2016.0592

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2017:1208

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: jasper security update
Advisory ID:       RHSA-2017:1208-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2017:1208
Issue date:        2017-05-09
CVE Names:         CVE-2015-5203 CVE-2015-5221 CVE-2016-10248 
                   CVE-2016-10249 CVE-2016-10251 CVE-2016-1577 
                   CVE-2016-1867 CVE-2016-2089 CVE-2016-2116 
                   CVE-2016-8654 CVE-2016-8690 CVE-2016-8691 
                   CVE-2016-8692 CVE-2016-8693 CVE-2016-8883 
                   CVE-2016-8884 CVE-2016-8885 CVE-2016-9262 
                   CVE-2016-9387 CVE-2016-9388 CVE-2016-9389 
                   CVE-2016-9390 CVE-2016-9391 CVE-2016-9392 
                   CVE-2016-9393 CVE-2016-9394 CVE-2016-9560 
                   CVE-2016-9583 CVE-2016-9591 CVE-2016-9600 
=====================================================================

1. Summary:

An update for jasper is now available for Red Hat Enterprise Linux 6 and
Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

3. Description:

JasPer is an implementation of Part 1 of the JPEG 2000 image compression
standard.

Security Fix(es):

Multiple flaws were found in the way JasPer decoded JPEG 2000 image files.
A specially crafted file could cause an application using JasPer to crash
or, possibly, execute arbitrary code. (CVE-2016-8654, CVE-2016-9560,
CVE-2016-10249, CVE-2015-5203, CVE-2015-5221, CVE-2016-1577, CVE-2016-8690,
CVE-2016-8693, CVE-2016-8884, CVE-2016-8885, CVE-2016-9262, CVE-2016-9591)

Multiple flaws were found in the way JasPer decoded JPEG 2000 image files.
A specially crafted file could cause an application using JasPer to crash.
(CVE-2016-1867, CVE-2016-2089, CVE-2016-2116, CVE-2016-8691, CVE-2016-8692,
CVE-2016-8883, CVE-2016-9387, CVE-2016-9388, CVE-2016-9389, CVE-2016-9390,
CVE-2016-9391, CVE-2016-9392, CVE-2016-9393, CVE-2016-9394, CVE-2016-9583,
CVE-2016-9600, CVE-2016-10248, CVE-2016-10251)

Red Hat would like to thank Liu Bingchang (IIE) for reporting
CVE-2016-8654, CVE-2016-9583, CVE-2016-9591, and CVE-2016-9600; Gustavo
Grieco for reporting CVE-2015-5203; and Josselin Feist for reporting
CVE-2015-5221.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1254242 - CVE-2015-5203 jasper: integer overflow in jas_image_cmpt_create()
1255710 - CVE-2015-5221 jasper: use-after-free and double-free flaws in mif_process_cmpt()
1298135 - CVE-2016-1867 jasper: out-of-bounds read in jpc_pi_nextcprl()
1302636 - CVE-2016-2089 jasper: matrix rows_ NULL pointer dereference in jas_matrix_clip()
1314466 - CVE-2016-1577 jasper: double free issue in jas_iccattrval_destroy()
1314472 - CVE-2016-2116 jasper: memory leak in jas_iccprof_createfrombuf()
1385499 - CVE-2016-8690 CVE-2016-8884 CVE-2016-8885 jasper: missing jas_matrix_create() parameter checks
1385502 - CVE-2016-8691 CVE-2016-8692 jasper: missing SIZ marker segment XRsiz and YRsiz fields range check
1385507 - CVE-2016-8693 jasper: incorrect handling of bufsize 0 in mem_resize()
1388840 - CVE-2016-10249 jasper: integer overflow in jas_matrix_create()
1388870 - CVE-2016-8883 jasper: reachable asserts in jpc_dec_tiledecode()
1393882 - CVE-2016-9262 jasper: integer truncation in jas_image_cmpt_create()
1396959 - CVE-2016-9387 jasper: integer overflow in jpc_dec_process_siz()
1396962 - CVE-2016-9388 jasper: reachable assertions in RAS encoder/decoder
1396963 - CVE-2016-9389 jasper: reachable assertions caused by insufficient component domains checks in ICT/RCT in JPC codec
1396965 - CVE-2016-9390 jasper: insufficient SIZ marker tilexoff and tileyoff checks
1396967 - CVE-2016-9391 jasper: reachable assertions in the JPC bitstream code
1396971 - CVE-2016-9392 CVE-2016-9393 CVE-2016-9394 jasper: insufficient SIZ marker segment data sanity checks
1398256 - CVE-2016-9560 jasper: stack-based buffer overflow in jpc_dec_tileinit()
1399167 - CVE-2016-8654 jasper: heap-based buffer overflow in QMFB code in JPC codec
1405148 - CVE-2016-9583 jasper: integer overflows leading to out of bounds read in packet iterators in JPC decoder
1406405 - CVE-2016-9591 jasper: use-after-free / double-free in JPC encoder
1410026 - CVE-2016-9600 jasper: JP2 encoder NULL pointer dereference due to uninitialized cmprof_
1434447 - CVE-2016-10248 jasper: NULL pointer dereference in jpc_tsfb_synthesize()
1434461 - CVE-2016-10251 jasper: integer overflow in jpc_pi_nextcprl(), leading to out-of-bounds read

6. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source:
jasper-1.900.1-21.el6_9.src.rpm

i386:
jasper-1.900.1-21.el6_9.i686.rpm
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-libs-1.900.1-21.el6_9.i686.rpm

x86_64:
jasper-1.900.1-21.el6_9.x86_64.rpm
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-debuginfo-1.900.1-21.el6_9.x86_64.rpm
jasper-libs-1.900.1-21.el6_9.i686.rpm
jasper-libs-1.900.1-21.el6_9.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

i386:
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-devel-1.900.1-21.el6_9.i686.rpm
jasper-utils-1.900.1-21.el6_9.i686.rpm

x86_64:
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-debuginfo-1.900.1-21.el6_9.x86_64.rpm
jasper-devel-1.900.1-21.el6_9.i686.rpm
jasper-devel-1.900.1-21.el6_9.x86_64.rpm
jasper-utils-1.900.1-21.el6_9.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source:
jasper-1.900.1-21.el6_9.src.rpm

x86_64:
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-debuginfo-1.900.1-21.el6_9.x86_64.rpm
jasper-libs-1.900.1-21.el6_9.i686.rpm
jasper-libs-1.900.1-21.el6_9.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

x86_64:
jasper-1.900.1-21.el6_9.x86_64.rpm
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-debuginfo-1.900.1-21.el6_9.x86_64.rpm
jasper-devel-1.900.1-21.el6_9.i686.rpm
jasper-devel-1.900.1-21.el6_9.x86_64.rpm
jasper-utils-1.900.1-21.el6_9.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
jasper-1.900.1-21.el6_9.src.rpm

i386:
jasper-1.900.1-21.el6_9.i686.rpm
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-libs-1.900.1-21.el6_9.i686.rpm

ppc64:
jasper-1.900.1-21.el6_9.ppc64.rpm
jasper-debuginfo-1.900.1-21.el6_9.ppc.rpm
jasper-debuginfo-1.900.1-21.el6_9.ppc64.rpm
jasper-libs-1.900.1-21.el6_9.ppc.rpm
jasper-libs-1.900.1-21.el6_9.ppc64.rpm

s390x:
jasper-1.900.1-21.el6_9.s390x.rpm
jasper-debuginfo-1.900.1-21.el6_9.s390.rpm
jasper-debuginfo-1.900.1-21.el6_9.s390x.rpm
jasper-libs-1.900.1-21.el6_9.s390.rpm
jasper-libs-1.900.1-21.el6_9.s390x.rpm

x86_64:
jasper-1.900.1-21.el6_9.x86_64.rpm
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-debuginfo-1.900.1-21.el6_9.x86_64.rpm
jasper-libs-1.900.1-21.el6_9.i686.rpm
jasper-libs-1.900.1-21.el6_9.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

i386:
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-devel-1.900.1-21.el6_9.i686.rpm
jasper-utils-1.900.1-21.el6_9.i686.rpm

ppc64:
jasper-debuginfo-1.900.1-21.el6_9.ppc.rpm
jasper-debuginfo-1.900.1-21.el6_9.ppc64.rpm
jasper-devel-1.900.1-21.el6_9.ppc.rpm
jasper-devel-1.900.1-21.el6_9.ppc64.rpm
jasper-utils-1.900.1-21.el6_9.ppc64.rpm

s390x:
jasper-debuginfo-1.900.1-21.el6_9.s390.rpm
jasper-debuginfo-1.900.1-21.el6_9.s390x.rpm
jasper-devel-1.900.1-21.el6_9.s390.rpm
jasper-devel-1.900.1-21.el6_9.s390x.rpm
jasper-utils-1.900.1-21.el6_9.s390x.rpm

x86_64:
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-debuginfo-1.900.1-21.el6_9.x86_64.rpm
jasper-devel-1.900.1-21.el6_9.i686.rpm
jasper-devel-1.900.1-21.el6_9.x86_64.rpm
jasper-utils-1.900.1-21.el6_9.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
jasper-1.900.1-21.el6_9.src.rpm

i386:
jasper-1.900.1-21.el6_9.i686.rpm
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-libs-1.900.1-21.el6_9.i686.rpm

x86_64:
jasper-1.900.1-21.el6_9.x86_64.rpm
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-debuginfo-1.900.1-21.el6_9.x86_64.rpm
jasper-libs-1.900.1-21.el6_9.i686.rpm
jasper-libs-1.900.1-21.el6_9.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

i386:
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-devel-1.900.1-21.el6_9.i686.rpm
jasper-utils-1.900.1-21.el6_9.i686.rpm

x86_64:
jasper-debuginfo-1.900.1-21.el6_9.i686.rpm
jasper-debuginfo-1.900.1-21.el6_9.x86_64.rpm
jasper-devel-1.900.1-21.el6_9.i686.rpm
jasper-devel-1.900.1-21.el6_9.x86_64.rpm
jasper-utils-1.900.1-21.el6_9.x86_64.rpm

Red Hat Enterprise Linux Client (v. 7):

Source:
jasper-1.900.1-30.el7_3.src.rpm

x86_64:
jasper-debuginfo-1.900.1-30.el7_3.i686.rpm
jasper-debuginfo-1.900.1-30.el7_3.x86_64.rpm
jasper-libs-1.900.1-30.el7_3.i686.rpm
jasper-libs-1.900.1-30.el7_3.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64:
jasper-1.900.1-30.el7_3.x86_64.rpm
jasper-debuginfo-1.900.1-30.el7_3.i686.rpm
jasper-debuginfo-1.900.1-30.el7_3.x86_64.rpm
jasper-devel-1.900.1-30.el7_3.i686.rpm
jasper-devel-1.900.1-30.el7_3.x86_64.rpm
jasper-utils-1.900.1-30.el7_3.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
jasper-1.900.1-30.el7_3.src.rpm

x86_64:
jasper-debuginfo-1.900.1-30.el7_3.i686.rpm
jasper-debuginfo-1.900.1-30.el7_3.x86_64.rpm
jasper-libs-1.900.1-30.el7_3.i686.rpm
jasper-libs-1.900.1-30.el7_3.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64:
jasper-1.900.1-30.el7_3.x86_64.rpm
jasper-debuginfo-1.900.1-30.el7_3.i686.rpm
jasper-debuginfo-1.900.1-30.el7_3.x86_64.rpm
jasper-devel-1.900.1-30.el7_3.i686.rpm
jasper-devel-1.900.1-30.el7_3.x86_64.rpm
jasper-utils-1.900.1-30.el7_3.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
jasper-1.900.1-30.el7_3.src.rpm

aarch64:
jasper-debuginfo-1.900.1-30.el7_3.aarch64.rpm
jasper-libs-1.900.1-30.el7_3.aarch64.rpm

ppc64:
jasper-debuginfo-1.900.1-30.el7_3.ppc.rpm
jasper-debuginfo-1.900.1-30.el7_3.ppc64.rpm
jasper-libs-1.900.1-30.el7_3.ppc.rpm
jasper-libs-1.900.1-30.el7_3.ppc64.rpm

ppc64le:
jasper-debuginfo-1.900.1-30.el7_3.ppc64le.rpm
jasper-libs-1.900.1-30.el7_3.ppc64le.rpm

s390x:
jasper-debuginfo-1.900.1-30.el7_3.s390.rpm
jasper-debuginfo-1.900.1-30.el7_3.s390x.rpm
jasper-libs-1.900.1-30.el7_3.s390.rpm
jasper-libs-1.900.1-30.el7_3.s390x.rpm

x86_64:
jasper-debuginfo-1.900.1-30.el7_3.i686.rpm
jasper-debuginfo-1.900.1-30.el7_3.x86_64.rpm
jasper-libs-1.900.1-30.el7_3.i686.rpm
jasper-libs-1.900.1-30.el7_3.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

aarch64:
jasper-1.900.1-30.el7_3.aarch64.rpm
jasper-debuginfo-1.900.1-30.el7_3.aarch64.rpm
jasper-devel-1.900.1-30.el7_3.aarch64.rpm
jasper-utils-1.900.1-30.el7_3.aarch64.rpm

ppc64:
jasper-1.900.1-30.el7_3.ppc64.rpm
jasper-debuginfo-1.900.1-30.el7_3.ppc.rpm
jasper-debuginfo-1.900.1-30.el7_3.ppc64.rpm
jasper-devel-1.900.1-30.el7_3.ppc.rpm
jasper-devel-1.900.1-30.el7_3.ppc64.rpm
jasper-utils-1.900.1-30.el7_3.ppc64.rpm

ppc64le:
jasper-1.900.1-30.el7_3.ppc64le.rpm
jasper-debuginfo-1.900.1-30.el7_3.ppc64le.rpm
jasper-devel-1.900.1-30.el7_3.ppc64le.rpm
jasper-utils-1.900.1-30.el7_3.ppc64le.rpm

s390x:
jasper-1.900.1-30.el7_3.s390x.rpm
jasper-debuginfo-1.900.1-30.el7_3.s390.rpm
jasper-debuginfo-1.900.1-30.el7_3.s390x.rpm
jasper-devel-1.900.1-30.el7_3.s390.rpm
jasper-devel-1.900.1-30.el7_3.s390x.rpm
jasper-utils-1.900.1-30.el7_3.s390x.rpm

x86_64:
jasper-1.900.1-30.el7_3.x86_64.rpm
jasper-debuginfo-1.900.1-30.el7_3.i686.rpm
jasper-debuginfo-1.900.1-30.el7_3.x86_64.rpm
jasper-devel-1.900.1-30.el7_3.i686.rpm
jasper-devel-1.900.1-30.el7_3.x86_64.rpm
jasper-utils-1.900.1-30.el7_3.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
jasper-1.900.1-30.el7_3.src.rpm

x86_64:
jasper-debuginfo-1.900.1-30.el7_3.i686.rpm
jasper-debuginfo-1.900.1-30.el7_3.x86_64.rpm
jasper-libs-1.900.1-30.el7_3.i686.rpm
jasper-libs-1.900.1-30.el7_3.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64:
jasper-1.900.1-30.el7_3.x86_64.rpm
jasper-debuginfo-1.900.1-30.el7_3.i686.rpm
jasper-debuginfo-1.900.1-30.el7_3.x86_64.rpm
jasper-devel-1.900.1-30.el7_3.i686.rpm
jasper-devel-1.900.1-30.el7_3.x86_64.rpm
jasper-utils-1.900.1-30.el7_3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2015-5203
https://access.redhat.com/security/cve/CVE-2015-5221
https://access.redhat.com/security/cve/CVE-2016-10248
https://access.redhat.com/security/cve/CVE-2016-10249
https://access.redhat.com/security/cve/CVE-2016-10251
https://access.redhat.com/security/cve/CVE-2016-1577
https://access.redhat.com/security/cve/CVE-2016-1867
https://access.redhat.com/security/cve/CVE-2016-2089
https://access.redhat.com/security/cve/CVE-2016-2116
https://access.redhat.com/security/cve/CVE-2016-8654
https://access.redhat.com/security/cve/CVE-2016-8690
https://access.redhat.com/security/cve/CVE-2016-8691
https://access.redhat.com/security/cve/CVE-2016-8692
https://access.redhat.com/security/cve/CVE-2016-8693
https://access.redhat.com/security/cve/CVE-2016-8883
https://access.redhat.com/security/cve/CVE-2016-8884
https://access.redhat.com/security/cve/CVE-2016-8885
https://access.redhat.com/security/cve/CVE-2016-9262
https://access.redhat.com/security/cve/CVE-2016-9387
https://access.redhat.com/security/cve/CVE-2016-9388
https://access.redhat.com/security/cve/CVE-2016-9389
https://access.redhat.com/security/cve/CVE-2016-9390
https://access.redhat.com/security/cve/CVE-2016-9391
https://access.redhat.com/security/cve/CVE-2016-9392
https://access.redhat.com/security/cve/CVE-2016-9393
https://access.redhat.com/security/cve/CVE-2016-9394
https://access.redhat.com/security/cve/CVE-2016-9560
https://access.redhat.com/security/cve/CVE-2016-9583
https://access.redhat.com/security/cve/CVE-2016-9591
https://access.redhat.com/security/cve/CVE-2016-9600
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFZEg4lXlSAg2UNWIIRAuyVAJ9P9L4mLFrCZVWixRk6fXMAasAhMQCgxG8K
H3IC3a7qUw4PxFoXoRVkR5U=
=YNRv
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=OMxQ
-----END PGP SIGNATURE-----