<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2015-0235 Ghost in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32505#M23826</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please see official response from Palo Alto Networks on this matter:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;EM style="font-family: inherit; font-weight: inherit; font-size: 10pt; line-height: 1.5em;"&gt;The Palo Alto Networks product security team has been working to investigate our exposure and patch options to address CVE-2015-0235, otherwise known as “GHOST”.&amp;nbsp; This vulnerability has a massive footprint, affecting a commonly used function within glibc that has been around for decades.&amp;nbsp; As such, countless software and embedded systems are impacted by this vulnerability, ours being no exception. However, at this time we are not aware of any specific remotely exploitable conditions enabled by this vulnerability that affects any of our products.&amp;nbsp; We are working to develop a patch across all affected software, but we do not yet have an estimate for when a patch will be available.&amp;nbsp; We will provide more information when an estimate is available. &lt;/EM&gt;&lt;/P&gt;&lt;P style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;/P&gt;&lt;P style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;We will do our best to proactively update all our customers as more information becomes available. &lt;/P&gt;&lt;DIV&gt;&lt;EM style="font-weight: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Feb 2015 19:45:42 GMT</pubDate>
    <dc:creator>maurisy</dc:creator>
    <dc:date>2015-02-02T19:45:42Z</dc:date>
    <item>
      <title>CVE-2015-0235 Ghost</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32495#M23816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just starting a thread for&amp;nbsp; CVE-2015-0235. Ghost&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anybody see any news from PA on this? I have not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 04:59:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32495#M23816</guid>
      <dc:creator>choff123</dc:creator>
      <dc:date>2015-01-28T04:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2015-0235 Ghost</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32496#M23817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Choff123,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAN is aware of this vulnerability. This has been notified On Tuesday, January 27th, a Linux Remote Code Execution Vulnerability was discovered in the GetHost function in certain Linux distributions.&amp;nbsp; This is also known as the "GHOST glib gethostbyname" buffer overflow vulnerability, (CVE-2015-0235).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our existing signature with TID# &lt;SPAN style="font-size: 13.3333330154419px;"&gt;30384 should protect against this vulnerability. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/30384" title="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/30384"&gt;https://threatvault.paloaltonetworks.com/Home/ThreatDetail/30384&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SMTP EHLO/HELO overlong argument anomaly&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Signature ID : 30384&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;STRONG&gt;Description:&lt;/STRONG&gt; This anomaly would be triggered when an overlong parameter is sent to the HELOcommand of SMTP protocol. Some servers such as Tabs Laboratories MailCarrier2.51 might be prone to an overflow vulnerability while parsing the craftedrequest.A successful attack could lead to remote code execution with the privileges of the current logged-in user.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Severity high&lt;/P&gt;&lt;P&gt;Category code-execution&lt;/P&gt;&lt;P&gt;Default action alert&lt;/P&gt;&lt;P&gt;CVE CVE-2004-1638&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 05:22:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32496#M23817</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2015-01-28T05:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2015-0235 Ghost</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32497#M23818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello.&amp;nbsp; Please see &lt;A href="https://live.paloaltonetworks.com/docs/DOC-8807"&gt;GHOST - Linux Remote Code Execution CVE-2015-0235 0-day vulnerability&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 06:43:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32497#M23818</guid>
      <dc:creator>panagent</dc:creator>
      <dc:date>2015-01-28T06:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2015-0235 Ghost</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32498#M23819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When looking for information on a specific CVE the best place to start is the threat vault search.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/" title="https://threatvault.paloaltonetworks.com/"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once a CVE is covered in a signature they will be listed here.&amp;nbsp; If they are not listed it is not yet covered.&amp;nbsp; PA does not normally publish documentation for every CVE.&amp;nbsp; Those that are high or get a lot of press coverage this this then rate a document like the above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 11:34:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32498#M23819</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-01-28T11:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2015-0235 Ghost</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32499#M23820</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;Is the PA itself ok? the PAs run Linux?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 16:21:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32499#M23820</guid>
      <dc:creator>choff123</dc:creator>
      <dc:date>2015-01-28T16:21:23Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2015-0235 Ghost</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32500#M23821</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;choff123 wrote:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Is the PA itself ok? the PAs run Linux?&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;I have a case open and support are checking with our SE so I don't know if there is an official position yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same story with all our vendors - "&lt;EM&gt;watch this space&lt;/EM&gt;" &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 17:16:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32500#M23821</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2015-01-28T17:16:57Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2015-0235 Ghost</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32501#M23822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'll keep watching but I'd be surprised if they were.&amp;nbsp; This only affects processes that make DNS resolution calls.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 19:23:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32501#M23822</guid>
      <dc:creator>Dz3015</dc:creator>
      <dc:date>2015-01-28T19:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2015-0235 Ghost</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32502#M23823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well I get tons of suspicious domain alerts in my inbox, those are resolved from IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand, there was a patch for this a year or two ago that a lot of distros didn't apply. I would think PA uses a Linux branch in which they apply every security patch no matter what.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Jan 2015 18:22:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32502#M23823</guid>
      <dc:creator>choff123</dc:creator>
      <dc:date>2015-01-29T18:22:49Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2015-0235 Ghost</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32503#M23824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the applicability of a CVE to PanOS itself, I recommend you open a case in support or contact your Sales Engineer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is one of what I consider the weaknesses of Palo Alto Networks as a company.&amp;nbsp; They are as far from transparent as possible about which security issues affects their own PanOS as possible.&amp;nbsp; Most vendor have a customer login secured listing or database of how the various CVE affect their products, Palo Alto only publishes this information in a spotty fashion and usually in response to someone else pointing out that the issue affects PanOS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need information about PanOS vulnerabilities create a case or work with your Sales Engineer to get the direct information.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 31 Jan 2015 13:26:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32503#M23824</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-01-31T13:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2015-0235 Ghost</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32504#M23825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Support have come back saying Palo Alto have confirmed PAN-OS &lt;EM&gt;&lt;STRONG&gt;is&lt;/STRONG&gt;&lt;/EM&gt; vulnerable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No other details though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have to say I'm pretty disappointed at the lack of anything official from Palo Alto on this one - as a customer I shouldn't have to be the one chasing support to find out if a device we own and pay support on to protect our network is vulnerable or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Feb 2015 12:29:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32504#M23825</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2015-02-01T12:29:39Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2015-0235 Ghost</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32505#M23826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please see official response from Palo Alto Networks on this matter:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;EM style="font-family: inherit; font-weight: inherit; font-size: 10pt; line-height: 1.5em;"&gt;The Palo Alto Networks product security team has been working to investigate our exposure and patch options to address CVE-2015-0235, otherwise known as “GHOST”.&amp;nbsp; This vulnerability has a massive footprint, affecting a commonly used function within glibc that has been around for decades.&amp;nbsp; As such, countless software and embedded systems are impacted by this vulnerability, ours being no exception. However, at this time we are not aware of any specific remotely exploitable conditions enabled by this vulnerability that affects any of our products.&amp;nbsp; We are working to develop a patch across all affected software, but we do not yet have an estimate for when a patch will be available.&amp;nbsp; We will provide more information when an estimate is available. &lt;/EM&gt;&lt;/P&gt;&lt;P style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;/P&gt;&lt;P style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;We will do our best to proactively update all our customers as more information becomes available. &lt;/P&gt;&lt;DIV&gt;&lt;EM style="font-weight: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Feb 2015 19:45:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32505#M23826</guid>
      <dc:creator>maurisy</dc:creator>
      <dc:date>2015-02-02T19:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2015-0235 Ghost</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32506#M23827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline;"&gt;Palo Alto Networks Security Advisory Feb, 2015&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;GHOST: glibc vulnerability (CVE-2015-0235)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;EM&gt;Last revised: 02/02/2015&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;The open source library “glibc” has been found to contain a recently discovered vulnerability (CVE-2015-0235, commonly referred to as “GHOST”) that has been demonstrated to enable remote code execution in some software. Palo Alto Networks software makes use of the vulnerable library, however there is no known exploitable condition in PAN-OS software enabled by this vulnerability at the time of this advisory. An update to PAN-OS will be made available that addresses CVE-2015-0235 in a regularly scheduled software maintenance update. (Ref # 74443)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Severity: Low&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;The exploitability of CVE-2015-0235 on vulnerable systems is highly dependent on the architecture and design surrounding use of the vulnerable functions within the system, and exploitable conditions found across various open source software libraries have so far been exceedingly rare. At the time of this advisory, Palo Alto Networks is not aware of any specific remotely exploitable condition enabled by this vulnerability that affects any Palo Alto Networks products.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Products Affected&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;PAN-OS 6.1.2 and earlier; PAN-OS 6.0.8 and earlier; PAN-OS 5.0.15 and earlier&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Available Updates&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;A patch for the issue described in this bulletin will be made available in a regularly scheduled maintenance update for each supported release of PAN-OS. This bulletin will be updated as the releases are made available.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Workarounds and Mitigations&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;N/A&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Acknowledgements&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;N/A&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Feb 2015 20:54:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2015-0235-ghost/m-p/32506#M23827</guid>
      <dc:creator>maurisy</dc:creator>
      <dc:date>2015-02-02T20:54:13Z</dc:date>
    </item>
  </channel>
</rss>

