---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Webwasher URL Processing Denial of Service Vulnerability SECUNIA ADVISORY ID: SA29674 VERIFY ADVISORY: http://secunia.com/advisories/29674/ CRITICAL: Less critical IMPACT: DoS WHERE: >From local network SOFTWARE: Webwasher CSM Suite 5.x http://secunia.com/product/9786/ Webwasher 6.x http://secunia.com/product/18204/ WebWasher PG http://secunia.com/product/2402/ WebWasher EE http://secunia.com/product/2401/ DESCRIPTION: A vulnerability has been reported in Webwasher, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the processing of URLs when running on newer Linux system. This can be exploited to freeze the service via a specially crafted URL. The vulnerability is reported in the following products: * Webwasher appliances 6.x (CGLinux 4 or 5) prior to build number 3150 * Webwasher software versions prior to versions 6.6.3 build 3150 or 5.3.0 build 3159 running on: - RedHat Enterprise Linux 4 - Debian Linux 4 - SLES 10 SOLUTION: Update to versions 6.6.3 build 3150 or 5.3.0 build 3159: https://extranet.webwasher.com/download/csm/index.html PROVIDED AND/OR DISCOVERED BY: The vendor credits National Australia Bank Security Assurance. ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------