-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1621
                     USN-3971-1: Monit vulnerabilities
                                9 May 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Monit
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Access Privileged Data -- Existing Account            
                   Cross-site Scripting   -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-11455 CVE-2019-11454 

Reference:         ESB-2019.1450

Original Bulletin: 
   https://usn.ubuntu.com/3971-1/

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-3971-1: Monit vulnerabilities
8 May 2019

Monit vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:

  o Ubuntu 19.04
  o Ubuntu 18.10

Summary

Several security issues were fixed in Monit

Software Description

  o monit - utility for monitoring and managing daemons or similar programs

Details

Zack Flack discovered that Monit incorrectly handled certain input. A remote
authenticated user could exploit this to conduct cross-site scripting (XSS)
attacks. (CVE-2019-11454)

Zack Flack discovered a buffer overread when Monit decoded certain crafted
URLs. An attacker could exploit this to leak potentially sensitive information.
(CVE-2019-11455)

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 19.04
    monit - 1:5.25.2-3ubuntu0.1
Ubuntu 18.10
    monit - 1:5.25.2-1ubuntu0.1

To update your system, please follow these instructions: https://
wiki.ubuntu.com/Security/Upgrades .

In general, a standard system update will make all the necessary changes.

References

  o CVE-2019-11454
  o CVE-2019-11455

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=L24H
-----END PGP SIGNATURE-----