TITLE: Fedora update for HelixPlayer SECUNIA ADVISORY ID: SA16986 VERIFY ADVISORY: http://secunia.com/advisories/16986/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 4 http://secunia.com/product/5251/ Fedora Core 3 http://secunia.com/product/4222/ DESCRIPTION: Fedora has issued an update for HelixPlayer. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. For more information: SA16954 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ 0d2105b4f9e504e68c5121101ff7f029 SRPMS/HelixPlayer-1.0.6-0.fc3.1.src.rpm 1eb4319865abae87377c955d536413d9 x86_64/HelixPlayer-1.0.6-0.fc3.1.i386.rpm 1eb4319865abae87377c955d536413d9 i386/HelixPlayer-1.0.6-0.fc3.1.i386.rpm bd55fa13a2365b9dc17146a9459aae3d i386/debug/HelixPlayer-debuginfo-1.0.6-0.fc3.1.i386.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ 3d5af9a942d28c6d29d155e8d9ff98cb SRPMS/HelixPlayer-1.0.6-1.fc4.2.src.rpm a748fd17dbd43efdf948ca0bd09903f1 ppc/HelixPlayer-1.0.6-1.fc4.2.ppc.rpm 740ba16be6cde76bf17e88224cdb8f97 ppc/debug/HelixPlayer-debuginfo-1.0.6-1.fc4.2.ppc.rpm 969ad7eb2b328d6434f0683bfcaf0e68 i386/HelixPlayer-1.0.6-1.fc4.2.i386.rpm ce8974c0020d29cab2442ecd7726aa0b i386/debug/HelixPlayer-debuginfo-1.0.6-1.fc4.2.i386.rpm OTHER REFERENCES: SA16954: http://secunia.com/advisories/16954/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------