Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.1847 Remote code execution patched in php-horde-image 25 June 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: php-horde-image Publisher: Debian Operating System: Debian GNU/Linux 8 Linux variants Windows Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2017-14650 CVE-2017-9774 Original Bulletin: https://lists.debian.org/debian-lts-announce/2018/06/msg00002.html Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running php-horde-image check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : php-horde-image Version : 2.1.0-4+deb8u1 CVE IDs : CVE-2017-9774 CVE-2017-14650 Debian Bugs : #865505 876400 It was discovered that there were two remote code execution vulnerabilities in php-horde-image, the image processing library for the Horde <https://www.horde.org/> groupware tool: * CVE-2017-9774: A remote code execution vulnerability (RCE) that was exploitable by a logged-in user sending a maliciously crafted HTTP GET request to various image backends. Note that the fix applied upstream has a regression in that it ignores the "force aspect ratio" option; see <https://github.com/horde/Image/pull/1>. * CVE-2017-14650: Another RCE that was exploitable by a logged-in user sending a maliciously crafted GET request specifically to the "im" image backend. For Debian 8 "Jessie", these issues have been fixed in php-horde-image version 2.1.0-4+deb8u1. We recommend that you upgrade your php-horde-image packages. Regards, - - -- ,''`. : :' : Chris Lamb `. `'` lamby@debian.org / chris-lamb.co.uk `- - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAlsszcQACgkQHpU+J9Qx HljSXA/+JFT5MsPTrxe3hawjb3VrQt43OuDs20YkqEb37rz3OV/UGFiGLiIWKSFc cSeyNhxRL6FTj7OZzSiQBHMwWzRDpPp9jxJqJEDwnR3M/Il2gsZbRgFAg8xCEDkH JMIb0ExhwNmMPTnbPkWlWEd5PAn1VdfJAW3IgIHIlr9vgTeDXocSw82GNKQAEFMy ZEz1Wxdt0/Od43bRJtieNU5fd+JOCDcLTMVgUrozwTMdhZpPC0VEXIjWI4/zah56 LD8GTe1tQ1CST1PE29/GWsU05onARaWRVKzC0fL9YOQnh3SuHKUM9kHA48LlXFBu ruacoZolYwfwFrkbv1Z89+03wRvTL90QWpHPLfrE/oVQKtG1nSqY7jlrVOO22LGC YJWtOPnV9l8UEUHrbCKvd5TjFYsK6n1Yl/Dsud9LQhs9yUAveQ/ncGmmvk3TKKvI 9ETujsbNcTPczINqqiZSHBgU5e9mgK0FZq+6fA0CaAwHPeAb2hlLySOql2mMmhaj +YRgpM/v6t7cgvZdxvgwtU6qPxR7LbkGRGOtuSKBpp0ydDHaqP6UmfbYeYoQnNTs QzrSDE+IS1K5srytHugVq/ry/xZd223/6gmuyw9MP7yAMRp4pra8hluT8zS930Jv r7E3mKW9IgA8ZDq5VClAO+5FKiX5ljYlIjGQQm3RpcCuZv3dM/E= =bdlk - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWzA5OWaOgq3Tt24GAQj3IQ//Q4Co47xHvXK/nIHY9OUQLlWR8w7hGIoj ydLO6We4A7YGB4SyPd06/Y+Uk3p8De/482HOdaJxi9dcE/4nYR31CSkADgfF5OTM zkdLJ9ynnIYgtsLKnQyvHTnp9jWv18cshiD9mT9goECHTUXP2Guip55p1Qd6UL2S IifmyCUF/9Rgd0I3wBiSE2uve4TxtEyvGR+YmTGmUOp9wJYDqUnCkWeMoapZ3E2q 9iBcdHYTIbeUYkkoNJNgl2u1mYn1Sqh1cfpE0WZABkKOEIP2b+dotm43dG+/daLQ s2SPzpXlhpQFnzhWsRyJvqMe1bhGG67YPVaETEkD2YDGqvShy+e2lSLaPBOwk1PH 5G7MjNCNL5ED27h1eHn3J8QlWrdSlvXdtwVsbxQj0pzTyVlU7UNxJndPpZXWnFDt RE4dXyAh5A62dQA2wPmpICicLBhAgZfdQYx7R5eto7P9fPIaNsfHx5FBXC4+r77h lexznGLxVRhQL9VB3b8lwBAVgYp5YSGjKG5YufQ+kWuiuL9DZy2T917RxyvD9+D4 jK4S/bqIJXxCnTWiLIOPVkvbqYPsEazxu0uGlznmmzhzyzJCiYcZ1TQ/Jnn7nxhe Xd1NbIoOEi2zfeFtxnqoMd9cYKcccFhrOyhRp1GHh2fah8dp7l/8NWvciiL+FdAl rHzBPUYo8a0= =xQ8f -----END PGP SIGNATURE-----