-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1517
                           irssi security update
                               19 June 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           irssi
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-9469 CVE-2017-9468 

Reference:         ESB-2017.1469
                   ESB-2017.1441

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-3885

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3885-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
June 18, 2017                         https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : irssi
CVE ID         : CVE-2017-9468 CVE-2017-9469
Debian Bug     : 864400

Multiple vulnerabilities have been discovered in Irssi, a terminal based
IRC client. The Common Vulnerabilities and Exposures project identifies
the following problems:

CVE-2017-9468

    Joseph Bisch discovered that Irssi does not properly handle DCC
    messages without source nick/host. A malicious IRC server can take
    advantage of this flaw to cause Irssi to crash, resulting in a
    denial of service.

CVE-2017-9469

    Joseph Bisch discovered that Irssi does not properly handle
    receiving incorrectly quoted DCC files. A remote attacker can take
    advantage of this flaw to cause Irssi to crash, resulting in a
    denial of service.

For the oldstable distribution (jessie), these problems have been fixed
in version 0.8.17-1+deb8u4.

For the stable distribution (stretch), these problems have been fixed in
version 1.0.2-1+deb9u1.

For the unstable distribution (sid), these problems have been fixed in
version 1.0.3-1.

We recommend that you upgrade your irssi packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=Bd44
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWUcJZYx+lLeg9Ub1AQju5w/+P7pGsI2SK6pxv1o/DnT7HB+GgRyixKNc
hK6t8DUkuyrIwKGEat861mR1WMMHxcF/T5lQ0uhvedphCQqhZ4Ak5cPGPirr8pac
aNnWoDRt/J1yoiiRN8IkILAMCtOZvcti+TekeCvWE0vvqdjgpvaTofPtWnikOjaE
VAq0XhasycN5dSzRojpMrWlzJTo2kCQo/d9Wo9zO97pO+iHuofJOYz0WR489AIbT
ZdgWmiZw2lnRNtSQN7vb3cu3ZDiWdvODHLuNCsWqRrGR1Hjyub2OjGdQUSyhB5wx
K2Y/EP5ShguHwkGGMXd0+dUJVndTwetk2icT1zt6/zbZyDfudtwyZOcXfXhjZY3f
rdDkCeYGBuf3UTthVTUQ5oUIwjYZ/IhuxJ7+Ly9FcQfsSHKlHqXh1L3QyiwxOCg/
XRRYIvUPviSQnwcAcjFLjKSTYr7C0Z/KkwxZtXQiiAI8CqeOGrxsBD5hnBM2B3ed
r+mTJ2Tiics7gdn+MbZGMe64TwUq2M0n3E3IVKr04UjJl21m1MbitS4PhBCOcr7p
dqOpzztWczGSfq3HQVX8h0xxNj/zvk9b2FbBausxc8T1BYkvEXX/OoMht3A3kcVn
4l7ONmcocK3wxcWi8nHoxeQyL6jW28wO85IvhxUbFJcuImS3ngIf2lt4ZSxaLhOj
YKK6In4DsMw=
=u+WV
-----END PGP SIGNATURE-----