__________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN OpenSSH Security Update [RHSA-2006:0738-4] November 16, 2006 18:00 GMT Number R-050 ______________________________________________________________________________ PROBLEM: An authentication flaw was found in OpenSSH's privilege separation monitor. If it ever becomes possible to alter the behavior of the unprivileged process when OpenSSH is using privilege separation, an attacker may then be able to login without possessing proper credentials. PLATFORM: Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) DAMAGE: An attacker may be able to login without possessing proper credentials. SOLUTION: Apply current patches. ______________________________________________________________________________ VULNERABILITY The risk is LOW. An attacker may be able to login without ASSESSMENT: possessing proper credentials. ______________________________________________________________________________ LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/r-050.shtml ORIGINAL BULLETIN: https://rhn.redhat.com/errata/RHSA-2006-0738.html CVE: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5794 ______________________________________________________________________________ [***** Start RHSA-2006:0738-4 *****] Low: openssh security update Advisory: RHSA-2006:0738-4 Type: Security Advisory Severity: Low Issued on: 2006-11-15 Last updated on: 2006-11-15 Affected Products: Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) OVAL: com.redhat.rhsa-20060738.xml CVEs (cve.mitre.org): CVE-2006-5794 Details Updated openssh packages that fix an authentication flaw are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having low security impact by the Red Hat Security Response Team. OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This package includes the core files necessary for both the OpenSSH client and server. An authentication flaw was found in OpenSSH's privilege separation monitor. If it ever becomes possible to alter the behavior of the unprivileged process when OpenSSH is using privilege separation, an attacker may then be able to login without possessing proper credentials. (CVE-2006-5794) Please note that this flaw by itself poses no direct threat to OpenSSH users. Without another security flaw that could allow an attacker to alter the behavior of OpenSSH's unprivileged process, this flaw cannot be exploited. There are currently no known flaws to exploit this behavior. However, we have decided to issue this erratum to fix this flaw to reduce the security impact if an unprivileged process flaw is ever found. Users of openssh should upgrade to these updated packages, which contain a backported patch to resolve this issue. Solution Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. Updated packages Red Hat Desktop (v. 3) SRPMS: openssh-3.6.1p2-33.30.13.src.rpm b4e08619ea23f2af0429645d98639bd2 IA-32: openssh-3.6.1p2-33.30.13.i386.rpm dcd132e60b59e7a7fd75ac15f55b7207 openssh-askpass-3.6.1p2-33.30.13.i386.rpm f1e4ab33051a26303ecf5c8d0fa6d779 openssh-askpass-gnome-3.6.1p2-33.30.13.i386.rpm 7fe0c43c9178918e47af5b6cf7a53e50 openssh-clients-3.6.1p2-33.30.13.i386.rpm 53cbe1ce4743e7986ec6ca28c61c4941 openssh-server-3.6.1p2-33.30.13.i386.rpm e067fb1660d69db52438fd942b18b238 x86_64: openssh-3.6.1p2-33.30.13.x86_64.rpm 881bb14daa2f11d4ccbf6b2479df1074 openssh-askpass-3.6.1p2-33.30.13.x86_64.rpm 52a84e68e0900fa418a61f72ddb1c531 openssh-askpass-gnome-3.6.1p2-33.30.13.x86_64.rpm a621607fdbaafd4c58aa3627eeee5fe9 openssh-clients-3.6.1p2-33.30.13.x86_64.rpm 84688b731d914ad46b35afb375aacd5f openssh-server-3.6.1p2-33.30.13.x86_64.rpm 6e95eef8d383b8fe4f21dc64eebbd3cf Red Hat Desktop (v. 4) SRPMS: openssh-3.9p1-8.RHEL4.17.1.src.rpm 5270fb8ec13f23828a277857ae68b986 IA-32: openssh-3.9p1-8.RHEL4.17.1.i386.rpm 8b1c7fbd0bf72ceb0b2f5eda16d3fa5d openssh-askpass-3.9p1-8.RHEL4.17.1.i386.rpm 79f74f20a37e5e5d9f88bfc80927d201 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.i386.rpm 96db1c1a17e9348677f8d0eaf7d99116 openssh-clients-3.9p1-8.RHEL4.17.1.i386.rpm f349608f4e1e588f8c544564319f6388 openssh-server-3.9p1-8.RHEL4.17.1.i386.rpm 2c021513b7f7d86783342293d0a229e0 x86_64: openssh-3.9p1-8.RHEL4.17.1.x86_64.rpm 0ce295c848385f2a25fa17ae7c0beb52 openssh-askpass-3.9p1-8.RHEL4.17.1.x86_64.rpm 826459d7ddfb2b39e718cbb303f246bb openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.x86_64.rpm 3d56f032c9ab9d15327173acad692f93 openssh-clients-3.9p1-8.RHEL4.17.1.x86_64.rpm 7076713a1e1732e10a66be5dcdea4faa openssh-server-3.9p1-8.RHEL4.17.1.x86_64.rpm 3a7c7aa5c2378ac7c2954ff17acfca19 Red Hat Enterprise Linux AS (v. 3) SRPMS: openssh-3.6.1p2-33.30.13.src.rpm b4e08619ea23f2af0429645d98639bd2 IA-32: openssh-3.6.1p2-33.30.13.i386.rpm dcd132e60b59e7a7fd75ac15f55b7207 openssh-askpass-3.6.1p2-33.30.13.i386.rpm f1e4ab33051a26303ecf5c8d0fa6d779 openssh-askpass-gnome-3.6.1p2-33.30.13.i386.rpm 7fe0c43c9178918e47af5b6cf7a53e50 openssh-clients-3.6.1p2-33.30.13.i386.rpm 53cbe1ce4743e7986ec6ca28c61c4941 openssh-server-3.6.1p2-33.30.13.i386.rpm e067fb1660d69db52438fd942b18b238 IA-64: openssh-3.6.1p2-33.30.13.ia64.rpm 908a742ccbce2dc3633094328135143d openssh-askpass-3.6.1p2-33.30.13.ia64.rpm 3c81416cf2bb3e95a1df43cdb789f1d9 openssh-askpass-gnome-3.6.1p2-33.30.13.ia64.rpm ec530b9aae551ad18982fd7c88ea46c5 openssh-clients-3.6.1p2-33.30.13.ia64.rpm 21c01f4d6e41be485e0f4f0866c0bcab openssh-server-3.6.1p2-33.30.13.ia64.rpm 52dc05f6756942bb9cd36d652c3e0cb2 PPC: openssh-3.6.1p2-33.30.13.ppc.rpm 74d7a40819ac28ffe57b4d0358637aa5 openssh-askpass-3.6.1p2-33.30.13.ppc.rpm fb1b5891efc8fb9db26f989b48f7df9f openssh-askpass-gnome-3.6.1p2-33.30.13.ppc.rpm 30c4c779e67f9f140c1ba818d16b3389 openssh-clients-3.6.1p2-33.30.13.ppc.rpm 42654616ea74a154c8ec943ce0c99ced openssh-server-3.6.1p2-33.30.13.ppc.rpm dfca8ed1c115ea29121a6a75852d32a7 s390: openssh-3.6.1p2-33.30.13.s390.rpm 047c99c9d1f0a8302f3c0a751da3f99a openssh-askpass-3.6.1p2-33.30.13.s390.rpm 2dab72bc1e5f9f54b4e9caf201f9f617 openssh-askpass-gnome-3.6.1p2-33.30.13.s390.rpm 1dd2d0fdf4f8abf1b7fb839ff611dff1 openssh-clients-3.6.1p2-33.30.13.s390.rpm fda4dabc8b23e7f860766f8412b7abf7 openssh-server-3.6.1p2-33.30.13.s390.rpm fccc35c776978fe2654e7fbba3461dbf s390x: openssh-3.6.1p2-33.30.13.s390x.rpm e92b4ce6f01fca8daca17c7787253ce6 openssh-askpass-3.6.1p2-33.30.13.s390x.rpm b600a2739c93ecdb6e43821d1bafe16f openssh-askpass-gnome-3.6.1p2-33.30.13.s390x.rpm 56bb8de4d2423ee720bbfea87274a40e openssh-clients-3.6.1p2-33.30.13.s390x.rpm 5a4a37e51b6f7a0f36a698b5cc833628 openssh-server-3.6.1p2-33.30.13.s390x.rpm 518f3d002574064fe0401d724df50abd x86_64: openssh-3.6.1p2-33.30.13.x86_64.rpm 881bb14daa2f11d4ccbf6b2479df1074 openssh-askpass-3.6.1p2-33.30.13.x86_64.rpm 52a84e68e0900fa418a61f72ddb1c531 openssh-askpass-gnome-3.6.1p2-33.30.13.x86_64.rpm a621607fdbaafd4c58aa3627eeee5fe9 openssh-clients-3.6.1p2-33.30.13.x86_64.rpm 84688b731d914ad46b35afb375aacd5f openssh-server-3.6.1p2-33.30.13.x86_64.rpm 6e95eef8d383b8fe4f21dc64eebbd3cf Red Hat Enterprise Linux AS (v. 4) SRPMS: openssh-3.9p1-8.RHEL4.17.1.src.rpm 5270fb8ec13f23828a277857ae68b986 IA-32: openssh-3.9p1-8.RHEL4.17.1.i386.rpm 8b1c7fbd0bf72ceb0b2f5eda16d3fa5d openssh-askpass-3.9p1-8.RHEL4.17.1.i386.rpm 79f74f20a37e5e5d9f88bfc80927d201 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.i386.rpm 96db1c1a17e9348677f8d0eaf7d99116 openssh-clients-3.9p1-8.RHEL4.17.1.i386.rpm f349608f4e1e588f8c544564319f6388 openssh-server-3.9p1-8.RHEL4.17.1.i386.rpm 2c021513b7f7d86783342293d0a229e0 IA-64: openssh-3.9p1-8.RHEL4.17.1.ia64.rpm 9f7af45fa7b5a5960dae6481797df65f openssh-askpass-3.9p1-8.RHEL4.17.1.ia64.rpm 396afde30d013dc3b99473070c9ca016 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.ia64.rpm 05504a84c2ef6cd7eb50e8044d537733 openssh-clients-3.9p1-8.RHEL4.17.1.ia64.rpm 85931af336574b468781c5348c5be257 openssh-server-3.9p1-8.RHEL4.17.1.ia64.rpm 90098e9f32a04b29e707cc0b3716d438 PPC: openssh-3.9p1-8.RHEL4.17.1.ppc.rpm 2af4e90aa5c152ab51bae154ab54d69c openssh-askpass-3.9p1-8.RHEL4.17.1.ppc.rpm b6433ae6bb5b320b16b1970aaad929b1 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.ppc.rpm 246880b444305e3e2781ae06f6b0af4b openssh-clients-3.9p1-8.RHEL4.17.1.ppc.rpm c4cc7545bc8c4e68f9efc14cbee42069 openssh-server-3.9p1-8.RHEL4.17.1.ppc.rpm 0232045e1c230a1cb37ba40f44f4ec96 s390: openssh-3.9p1-8.RHEL4.17.1.s390.rpm d3ca921e20d2ed9af35eaba73baa434d openssh-askpass-3.9p1-8.RHEL4.17.1.s390.rpm 2bac8f50617955b5be6173b0b386f270 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.s390.rpm f853497e2fb1124055b4d2bede7c56de openssh-clients-3.9p1-8.RHEL4.17.1.s390.rpm fd1d9c9aaa84763fb1ad4d93df7da3df openssh-server-3.9p1-8.RHEL4.17.1.s390.rpm 81c1dfd0f611b7509e2d715e0dc005f0 s390x: openssh-3.9p1-8.RHEL4.17.1.s390x.rpm 79767ede8be763dab8cf825dfb203374 openssh-askpass-3.9p1-8.RHEL4.17.1.s390x.rpm 1e1891b117b67d9ae272fefa96f0b2df openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.s390x.rpm 5418dda31a691b7e1d86d367ae3e34cd openssh-clients-3.9p1-8.RHEL4.17.1.s390x.rpm f239e3313b6f50a5c75e1ffe86ecfde1 openssh-server-3.9p1-8.RHEL4.17.1.s390x.rpm 4d7d4015d1fa094b782079fcf046f887 x86_64: openssh-3.9p1-8.RHEL4.17.1.x86_64.rpm 0ce295c848385f2a25fa17ae7c0beb52 openssh-askpass-3.9p1-8.RHEL4.17.1.x86_64.rpm 826459d7ddfb2b39e718cbb303f246bb openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.x86_64.rpm 3d56f032c9ab9d15327173acad692f93 openssh-clients-3.9p1-8.RHEL4.17.1.x86_64.rpm 7076713a1e1732e10a66be5dcdea4faa openssh-server-3.9p1-8.RHEL4.17.1.x86_64.rpm 3a7c7aa5c2378ac7c2954ff17acfca19 Red Hat Enterprise Linux ES (v. 3) SRPMS: openssh-3.6.1p2-33.30.13.src.rpm b4e08619ea23f2af0429645d98639bd2 IA-32: openssh-3.6.1p2-33.30.13.i386.rpm dcd132e60b59e7a7fd75ac15f55b7207 openssh-askpass-3.6.1p2-33.30.13.i386.rpm f1e4ab33051a26303ecf5c8d0fa6d779 openssh-askpass-gnome-3.6.1p2-33.30.13.i386.rpm 7fe0c43c9178918e47af5b6cf7a53e50 openssh-clients-3.6.1p2-33.30.13.i386.rpm 53cbe1ce4743e7986ec6ca28c61c4941 openssh-server-3.6.1p2-33.30.13.i386.rpm e067fb1660d69db52438fd942b18b238 IA-64: openssh-3.6.1p2-33.30.13.ia64.rpm 908a742ccbce2dc3633094328135143d openssh-askpass-3.6.1p2-33.30.13.ia64.rpm 3c81416cf2bb3e95a1df43cdb789f1d9 openssh-askpass-gnome-3.6.1p2-33.30.13.ia64.rpm ec530b9aae551ad18982fd7c88ea46c5 openssh-clients-3.6.1p2-33.30.13.ia64.rpm 21c01f4d6e41be485e0f4f0866c0bcab openssh-server-3.6.1p2-33.30.13.ia64.rpm 52dc05f6756942bb9cd36d652c3e0cb2 x86_64: openssh-3.6.1p2-33.30.13.x86_64.rpm 881bb14daa2f11d4ccbf6b2479df1074 openssh-askpass-3.6.1p2-33.30.13.x86_64.rpm 52a84e68e0900fa418a61f72ddb1c531 openssh-askpass-gnome-3.6.1p2-33.30.13.x86_64.rpm a621607fdbaafd4c58aa3627eeee5fe9 openssh-clients-3.6.1p2-33.30.13.x86_64.rpm 84688b731d914ad46b35afb375aacd5f openssh-server-3.6.1p2-33.30.13.x86_64.rpm 6e95eef8d383b8fe4f21dc64eebbd3cf Red Hat Enterprise Linux ES (v. 4) SRPMS: openssh-3.9p1-8.RHEL4.17.1.src.rpm 5270fb8ec13f23828a277857ae68b986 IA-32: openssh-3.9p1-8.RHEL4.17.1.i386.rpm 8b1c7fbd0bf72ceb0b2f5eda16d3fa5d openssh-askpass-3.9p1-8.RHEL4.17.1.i386.rpm 79f74f20a37e5e5d9f88bfc80927d201 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.i386.rpm 96db1c1a17e9348677f8d0eaf7d99116 openssh-clients-3.9p1-8.RHEL4.17.1.i386.rpm f349608f4e1e588f8c544564319f6388 openssh-server-3.9p1-8.RHEL4.17.1.i386.rpm 2c021513b7f7d86783342293d0a229e0 IA-64: openssh-3.9p1-8.RHEL4.17.1.ia64.rpm 9f7af45fa7b5a5960dae6481797df65f openssh-askpass-3.9p1-8.RHEL4.17.1.ia64.rpm 396afde30d013dc3b99473070c9ca016 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.ia64.rpm 05504a84c2ef6cd7eb50e8044d537733 openssh-clients-3.9p1-8.RHEL4.17.1.ia64.rpm 85931af336574b468781c5348c5be257 openssh-server-3.9p1-8.RHEL4.17.1.ia64.rpm 90098e9f32a04b29e707cc0b3716d438 x86_64: openssh-3.9p1-8.RHEL4.17.1.x86_64.rpm 0ce295c848385f2a25fa17ae7c0beb52 openssh-askpass-3.9p1-8.RHEL4.17.1.x86_64.rpm 826459d7ddfb2b39e718cbb303f246bb openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.x86_64.rpm 3d56f032c9ab9d15327173acad692f93 openssh-clients-3.9p1-8.RHEL4.17.1.x86_64.rpm 7076713a1e1732e10a66be5dcdea4faa openssh-server-3.9p1-8.RHEL4.17.1.x86_64.rpm 3a7c7aa5c2378ac7c2954ff17acfca19 Red Hat Enterprise Linux WS (v. 3) SRPMS: openssh-3.6.1p2-33.30.13.src.rpm b4e08619ea23f2af0429645d98639bd2 IA-32: openssh-3.6.1p2-33.30.13.i386.rpm dcd132e60b59e7a7fd75ac15f55b7207 openssh-askpass-3.6.1p2-33.30.13.i386.rpm f1e4ab33051a26303ecf5c8d0fa6d779 openssh-askpass-gnome-3.6.1p2-33.30.13.i386.rpm 7fe0c43c9178918e47af5b6cf7a53e50 openssh-clients-3.6.1p2-33.30.13.i386.rpm 53cbe1ce4743e7986ec6ca28c61c4941 openssh-server-3.6.1p2-33.30.13.i386.rpm e067fb1660d69db52438fd942b18b238 IA-64: openssh-3.6.1p2-33.30.13.ia64.rpm 908a742ccbce2dc3633094328135143d openssh-askpass-3.6.1p2-33.30.13.ia64.rpm 3c81416cf2bb3e95a1df43cdb789f1d9 openssh-askpass-gnome-3.6.1p2-33.30.13.ia64.rpm ec530b9aae551ad18982fd7c88ea46c5 openssh-clients-3.6.1p2-33.30.13.ia64.rpm 21c01f4d6e41be485e0f4f0866c0bcab openssh-server-3.6.1p2-33.30.13.ia64.rpm 52dc05f6756942bb9cd36d652c3e0cb2 x86_64: openssh-3.6.1p2-33.30.13.x86_64.rpm 881bb14daa2f11d4ccbf6b2479df1074 openssh-askpass-3.6.1p2-33.30.13.x86_64.rpm 52a84e68e0900fa418a61f72ddb1c531 openssh-askpass-gnome-3.6.1p2-33.30.13.x86_64.rpm a621607fdbaafd4c58aa3627eeee5fe9 openssh-clients-3.6.1p2-33.30.13.x86_64.rpm 84688b731d914ad46b35afb375aacd5f openssh-server-3.6.1p2-33.30.13.x86_64.rpm 6e95eef8d383b8fe4f21dc64eebbd3cf Red Hat Enterprise Linux WS (v. 4) SRPMS: openssh-3.9p1-8.RHEL4.17.1.src.rpm 5270fb8ec13f23828a277857ae68b986 IA-32: openssh-3.9p1-8.RHEL4.17.1.i386.rpm 8b1c7fbd0bf72ceb0b2f5eda16d3fa5d openssh-askpass-3.9p1-8.RHEL4.17.1.i386.rpm 79f74f20a37e5e5d9f88bfc80927d201 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.i386.rpm 96db1c1a17e9348677f8d0eaf7d99116 openssh-clients-3.9p1-8.RHEL4.17.1.i386.rpm f349608f4e1e588f8c544564319f6388 openssh-server-3.9p1-8.RHEL4.17.1.i386.rpm 2c021513b7f7d86783342293d0a229e0 IA-64: openssh-3.9p1-8.RHEL4.17.1.ia64.rpm 9f7af45fa7b5a5960dae6481797df65f openssh-askpass-3.9p1-8.RHEL4.17.1.ia64.rpm 396afde30d013dc3b99473070c9ca016 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.ia64.rpm 05504a84c2ef6cd7eb50e8044d537733 openssh-clients-3.9p1-8.RHEL4.17.1.ia64.rpm 85931af336574b468781c5348c5be257 openssh-server-3.9p1-8.RHEL4.17.1.ia64.rpm 90098e9f32a04b29e707cc0b3716d438 x86_64: openssh-3.9p1-8.RHEL4.17.1.x86_64.rpm 0ce295c848385f2a25fa17ae7c0beb52 openssh-askpass-3.9p1-8.RHEL4.17.1.x86_64.rpm 826459d7ddfb2b39e718cbb303f246bb openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.x86_64.rpm 3d56f032c9ab9d15327173acad692f93 openssh-clients-3.9p1-8.RHEL4.17.1.x86_64.rpm 7076713a1e1732e10a66be5dcdea4faa openssh-server-3.9p1-8.RHEL4.17.1.x86_64.rpm 3a7c7aa5c2378ac7c2954ff17acfca19 (The unlinked packages above are only available from the Red Hat Network) Bugs fixed (see bugzilla for more information) 214640 - CVE-2006-5794 OpenSSH privilege separation flaw References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5794 http://www.redhat.com/security/updates/classification/#low [***** End RHSA-2006:0738-4 *****] _______________________________________________________________________________ CIAC wishes to acknowledge the contributions of Red Hat for the information contained in this bulletin. _______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 (7x24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) R-040: Cumulative Security Update for Internet Explorer R-041: Vulnerability in Microsoft Agent R-042: Vulnerabilities in Macromedia Flash Player from Adobe R-043: Vulnerability in Workstation Service R-044: Vulnerability in Microsoft XML Core Services R-045: WinZip FileView ActiveX Control R-046: Elinks Security Update R-047: Citrix Advanced Access Control R-048: Citrix Access Gateway R-049: HTTP Header Injection Vulnerabilities in Adobe Flash Player