-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ##################################################### ## N C S C ~ B E V E I L I G I N G S A D V I E S ## ##################################################### Titel : Kwetsbaarheden verholpen in Microsoft Windows Advisory ID : NCSC-2024-0392 Versie : 1.00 Kans : medium CVE ID : CVE-2024-6197, CVE-2024-20659, CVE-2024-30092, CVE-2024-37976, CVE-2024-37979, CVE-2024-37982, CVE-2024-37983, CVE-2024-38029, CVE-2024-38124, CVE-2024-38129, CVE-2024-38149, CVE-2024-38179, CVE-2024-38212, CVE-2024-38261, CVE-2024-38262, CVE-2024-38265, CVE-2024-43453, CVE-2024-43456, CVE-2024-43500, CVE-2024-43501, CVE-2024-43502, CVE-2024-43506, CVE-2024-43508, CVE-2024-43509, CVE-2024-43511, CVE-2024-43512, CVE-2024-43513, CVE-2024-43514, CVE-2024-43515, CVE-2024-43516, CVE-2024-43517, CVE-2024-43518, CVE-2024-43519, CVE-2024-43520, CVE-2024-43521, CVE-2024-43522, CVE-2024-43523, CVE-2024-43524, CVE-2024-43525, CVE-2024-43526, CVE-2024-43527, CVE-2024-43528, CVE-2024-43529, CVE-2024-43532, CVE-2024-43533, CVE-2024-43534, CVE-2024-43535, CVE-2024-43536, CVE-2024-43537, CVE-2024-43538, CVE-2024-43540, CVE-2024-43541, CVE-2024-43542, CVE-2024-43543, CVE-2024-43544, CVE-2024-43545, CVE-2024-43546, CVE-2024-43547, CVE-2024-43549, CVE-2024-43550, CVE-2024-43551, CVE-2024-43552, CVE-2024-43553, CVE-2024-43554, CVE-2024-43555, CVE-2024-43556, CVE-2024-43557, CVE-2024-43558, CVE-2024-43559, CVE-2024-43560, CVE-2024-43561, CVE-2024-43562, CVE-2024-43563, CVE-2024-43564, CVE-2024-43565, CVE-2024-43567, CVE-2024-43570, CVE-2024-43571, CVE-2024-43572, CVE-2024-43573, CVE-2024-43574, CVE-2024-43575, CVE-2024-43581, CVE-2024-43582, CVE-2024-43583, CVE-2024-43584, CVE-2024-43585, CVE-2024-43589, CVE-2024-43592, CVE-2024-43593, CVE-2024-43599, CVE-2024-43607, CVE-2024-43608, CVE-2024-43611, CVE-2024-43615 (Details over de kwetsbaarheden kunt u vinden op de Mitre website: https://cve.mitre.org/cve/) Schade : high Improper Input Validation Integer Overflow or Wraparound Numeric Truncation Error Incorrect Access of Indexable Resource ('Range Error') Loop with Unreachable Exit Condition ('Infinite Loop') Double Free Protection Mechanism Failure Use After Free Inclusion of Functionality from Untrusted Control Sphere Missing Authorization URL Redirection to Untrusted Site ('Open Redirect') Sensitive Data Storage in Improperly Locked Memory Use of Uninitialized Resource Time-of-check Time-of-use (TOCTOU) Race Condition NULL Pointer Dereference Stack-based Buffer Overflow Untrusted Pointer Dereference Execution with Unnecessary Privileges Allocation of Resources Without Limits or Throttling Improper Link Resolution Before File Access ('Link Following') Out-of-bounds Read External Control of File Name or Path Free of Memory not on the Heap Improper Restriction of Communication Channel to Intended Endpoints Observable Discrepancy Uncontrolled Resource Consumption Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Buffer Over-read Improper Neutralization Improper Access Control Heap-based Buffer Overflow Missing Cryptographic Step Improper Authorization Incorrect Check of Function Return Value Improper Removal of Sensitive Information Before Storage or Transfer Improper Certificate Validation Not Failing Securely ('Failing Open') Improper Authentication Uitgiftedatum : 20241008 Toepassing : microsoft azure_stack_hci microsoft remote_desktop_client_for_windows_desktop microsoft windows microsoft windows_10_version_1507 microsoft windows_10_version_1607 microsoft windows_10_version_1809 microsoft windows_10_version_21h2 microsoft windows_10_version_22h2 microsoft windows_11_version_21h2 microsoft windows_11_version_22h2 microsoft windows_11_version_22h3 microsoft windows_11_version_23h2 microsoft windows_11_version_24h2 microsoft windows_server_2008__service_pack_2 microsoft windows_server_2008_r2_service_pack_1 microsoft windows_server_2008_r2_service_pack_1__serve r_core_installation_ microsoft windows_server_2008_service_pack_2 microsoft windows_server_2008_service_pack_2__server_c ore_installation_ microsoft windows_server_2012 microsoft windows_server_2012__server_core_installation_ microsoft windows_server_2012_r2 microsoft windows_server_2012_r2__server_core_installation_ microsoft windows_server_2016 microsoft windows_server_2016__server_core_installation_ microsoft windows_server_2019 microsoft windows_server_2019__server_core_installation_ microsoft windows_server_2022 microsoft windows_server_2022__23h2_edition__server_co re_installation_ Versie(s) : Platform(s) : microsoft windows microsoft windows_10 microsoft windows_11 microsoft windows_server_2008 microsoft windows_server_2012 microsoft windows_server_2016 microsoft windows_server_2019 microsoft windows_server_2022 microsoft windows_server_2022_23h2 Beschrijving Microsoft heeft kwetsbaarheden verholpen in Windows. Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot onderstaande categorieën schade. De ernstigste kwetsbaarheid heeft kenmerk CVE-2024-38124 toegewezen gekregen en bevindt zich in de NETLOGON functionaliteit. Succesvol misbruik is echter niet eenvoudig en vereist voorafgaande kennis van de infrastructuur en precieze timing, waarbij een randvoorwaarde van succes is dat er een nieuwe Domain Controller wordt ingericht. ``` Microsoft Simple Certificate Enrollment Protocol: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43541 | 7.50 | Denial-of-Service | | CVE-2024-43544 | 7.50 | Denial-of-Service | |----------------|------|-------------------------------------| Windows cURL Implementation: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-6197 | 8.80 | Uitvoeren van willekeurige code, | |----------------|------|-------------------------------------| Windows Secure Channel: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43550 | 7.40 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Windows Remote Desktop: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43582 | 8.10 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft ActiveX: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43517 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Telephony Server: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43518 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Remote Desktop Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43456 | 4.80 | Manipuleren van gegevens | |----------------|------|-------------------------------------| Windows MSHTML Platform: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43573 | 6.50 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Windows Mobile Broadband: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43525 | 6.80 | Uitvoeren van willekeurige code | | CVE-2024-43526 | 6.80 | Uitvoeren van willekeurige code | | CVE-2024-43537 | 6.50 | Denial-of-Service | | CVE-2024-43538 | 6.50 | Denial-of-Service | | CVE-2024-43540 | 6.50 | Denial-of-Service | | CVE-2024-43542 | 6.50 | Denial-of-Service | | CVE-2024-43543 | 6.80 | Uitvoeren van willekeurige code | | CVE-2024-43523 | 6.80 | Uitvoeren van willekeurige code | | CVE-2024-43524 | 6.80 | Uitvoeren van willekeurige code | | CVE-2024-43536 | 6.80 | Uitvoeren van willekeurige code | | CVE-2024-43555 | 6.50 | Denial-of-Service | | CVE-2024-43557 | 6.50 | Denial-of-Service | | CVE-2024-43558 | 6.50 | Denial-of-Service | | CVE-2024-43559 | 6.50 | Denial-of-Service | | CVE-2024-43561 | 6.50 | Denial-of-Service | |----------------|------|-------------------------------------| Windows Standards-Based Storage Management Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43512 | 6.50 | Denial-of-Service | |----------------|------|-------------------------------------| Microsoft WDAC OLE DB provider for SQL: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43519 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Remote Desktop Client: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43533 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-43599 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Kernel-Mode Drivers: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43535 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2024-43554 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Code Integrity Guard: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43585 | 5.50 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| Windows Print Spooler Components: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43529 | 7.30 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Resilient File System (ReFS): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43500 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Microsoft Management Console: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43572 | 7.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| RPC Endpoint Mapper Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43532 | 8.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Microsoft Graphics Component: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43508 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2024-43534 | 6.50 | Toegang tot gevoelige gegevens | | CVE-2024-43509 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2024-43556 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Local Security Authority (LSA): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43522 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Sudo for Windows: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43571 | 5.60 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Windows Scripting: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43584 | 7.70 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| Winlogon: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43583 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Kerberos: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-38129 | 7.50 | Verkrijgen van verhoogde rechten | | CVE-2024-43547 | 6.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Cryptographic Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43546 | 5.60 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Routing and Remote Access Service (RRAS): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-38261 | 7.80 | Uitvoeren van willekeurige code | | CVE-2024-43608 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-43607 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-38265 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-43453 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-38212 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-43549 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-43564 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-43589 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-43592 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-43593 | 8.80 | Uitvoeren van willekeurige code | | CVE-2024-43611 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows EFI Partition: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-37976 | 6.70 | Omzeilen van beveiligingsmaatregel | | CVE-2024-37982 | 6.70 | Omzeilen van beveiligingsmaatregel | | CVE-2024-37983 | 6.70 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| Role: Windows Hyper-V: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-20659 | 7.10 | Omzeilen van beveiligingsmaatregel | | CVE-2024-43521 | 7.50 | Denial-of-Service | | CVE-2024-43567 | 7.50 | Denial-of-Service | | CVE-2024-43575 | 7.50 | Denial-of-Service | |----------------|------|-------------------------------------| Windows Hyper-V: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-30092 | 8.00 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows NT OS Kernel: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43553 | 7.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Network Address Translation (NAT): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43562 | 7.50 | Denial-of-Service | | CVE-2024-43565 | 7.50 | Denial-of-Service | |----------------|------|-------------------------------------| Windows Remote Desktop Licensing Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-38262 | 7.50 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| OpenSSH for Windows: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43581 | 7.10 | Uitvoeren van willekeurige code | | CVE-2024-43615 | 7.10 | Uitvoeren van willekeurige code | | CVE-2024-38029 | 7.50 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows NTFS: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43514 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Netlogon: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-38124 | 9.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Storage Port Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43560 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Common Log File System Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43501 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Secure Kernel Mode: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43516 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2024-43528 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Microsoft Windows Speech: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43574 | 8.30 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Ancillary Function Driver for WinSock: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43563 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows BitLocker: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43513 | 6.40 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| Windows Online Certificate Status Protocol (OCSP): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43545 | 7.50 | Denial-of-Service | |----------------|------|-------------------------------------| Internet Small Computer Systems Interface (iSCSI): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43515 | 7.50 | Denial-of-Service | |----------------|------|-------------------------------------| Windows Kernel: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43502 | 7.10 | Verkrijgen van verhoogde rechten | | CVE-2024-43527 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2024-37979 | 6.70 | Verkrijgen van verhoogde rechten | | CVE-2024-43511 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2024-43520 | 5.00 | Denial-of-Service | | CVE-2024-43570 | 6.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Azure Stack: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-38179 | 8.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Storage: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43551 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Shell: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43552 | 7.30 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| BranchCache: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2024-43506 | 7.50 | Denial-of-Service | | CVE-2024-38149 | 7.50 | Denial-of-Service | |----------------|------|-------------------------------------| ``` Mogelijke oplossingen Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op: https://portal.msrc.microsoft.com/en-us/security-guidance Referenties: Vrijwaringsverklaring Door gebruik van deze security advisory gaat u akkoord met de navolgende voorwaarden. Ondanks dat het NCSC de grootst mogelijke zorg heeft betracht bij de samenstelling van dit beveiligingsadvies, kan het NCSC niet instaan voor de volledigheid, juistheid of (voortdurende) actualiteit van dit beveiligingsadvies. De informatie in dit beveiligingsadvies is uitsluitend bedoeld als algemene informatie voor professionele partijen. Aan de informatie in dit beveiligingsadvies kunnen geen rechten worden ontleend. Het NCSC en de Staat zijn niet aansprakelijk voor enige schade ten gevolge van het gebruik of de onmogelijkheid van het gebruik van dit beveiligingsadvies, waaronder begrepen schade ten gevolge van de onjuistheid of onvolledigheid van de informatie in dit beveiligingsadvies. Op dit beveiligingsadvies is Nederlands recht van toepassing. Alle geschillen in verband met en/of voortvloeiend uit dit beveiligingsadvies zullen worden voorgelegd aan de exclusief bevoegde rechter te Den Haag. Deze rechtskeuze geldt tevens voor de voorzieningenrechter in kort geding. -----BEGIN PGP SIGNATURE----- wsDzBAEBCgAdBQJnBY44FiEEbfBszMuom42mJgp8sECQZ3v2JPIACgkQsECQZ3v2 JPLOmAv+Mq6Qk7suxlJRt8WfZ7fYG6zcvDdHRwh0F0aT8dM78HbU6J6H1iQG7Nre 5q5RFnt6BJzn9d1Bok55xBuKTJYvZP3qc89Kc8Myg+UWNjm435lMda8X1SNuE0m/ TfchneyuOQA88or1/WarVYZJCprRLsEbQ1y5MbU7p9zw8LTFYHL+JqdeKQbMbMIZ qqdXrh3hOkHiNCcP8JFJquY3UMZirkeIYNKebPD1g3NTyZa0SHwQn721ezf4iXlS OVx5qDDCAjm8a0BXIMKolvuPNAqsjdPRaz6UAyJEzCQgNkSwNrj5pa0Ocu5YQspi MUlTglZFQq6yoia/1m/wM4so0fRrwAeC97aYVFsjD25u8UmdBlA6AwoGbu1IoNhZ L2GJdMb2/ZrM50LsSwYE7mgUY22LwE4+54Li2HN3vux2g9mLePa1LIa1mS04OwkI w01j+9q4IxDveHdaUkXUnCjSHuIUOG5fyWa80Fh2uE4DO6tG1Oj2s5VLFdYSFnyF z3WOF3OY =mRdO -----END PGP SIGNATURE-----