TITLE: Debian update for linux-ftpd-ssl SECUNIA ADVISORY ID: SA17586 VERIFY ADVISORY: http://secunia.com/advisories/17586/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for linux-ftpd-ssl. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. For more information: SA17465 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/linux-ftpd-ssl_0.17.18+0.3-3sarge1.dsc Size/MD5 checksum: 640 f1999dff20d8e5c7bebbdf3ae08d9fbc http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/linux-ftpd-ssl_0.17.18+0.3-3sarge1.diff.gz Size/MD5 checksum: 5157 bb183553291a97a7505dd3eba1ee28aa http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/linux-ftpd-ssl_0.17.18+0.3.orig.tar.gz Size/MD5 checksum: 61388 525f77ad02c5593fa4c5cad9abc337b7 Alpha architecture: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/ftpd-ssl_0.17.18+0.3-3sarge1_alpha.deb Size/MD5 checksum: 55448 5e4b657d47730305099a47ec2d8c84df AMD64 architecture: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/ftpd-ssl_0.17.18+0.3-3sarge1_amd64.deb Size/MD5 checksum: 50938 87ab0d101dc0e1c14d38888231abf11f ARM architecture: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/ftpd-ssl_0.17.18+0.3-3sarge1_arm.deb Size/MD5 checksum: 49478 d964f72a931cee99c560c1f348b9f733 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/ftpd-ssl_0.17.18+0.3-3sarge1_i386.deb Size/MD5 checksum: 48598 6092dcf5345c383959b9b8b3a9d9b65f Intel IA-64 architecture: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/ftpd-ssl_0.17.18+0.3-3sarge1_ia64.deb Size/MD5 checksum: 65312 1f80c1ef53e6151a8d7df0ed0f2160cb HP Precision architecture: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/ftpd-ssl_0.17.18+0.3-3sarge1_hppa.deb Size/MD5 checksum: 53384 a247343d426eb9ecff838905432943d8 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/ftpd-ssl_0.17.18+0.3-3sarge1_m68k.deb Size/MD5 checksum: 46112 bedd079aca908ad7f31f7fb8fe0ecab7 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/ftpd-ssl_0.17.18+0.3-3sarge1_mips.deb Size/MD5 checksum: 52262 fe07040d4d3db4fe2cd4e02c873131ee Little endian MIPS architecture: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/ftpd-ssl_0.17.18+0.3-3sarge1_mipsel.deb Size/MD5 checksum: 52074 5b1e112532d8b07ab278d036515d85d3 PowerPC architecture: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/ftpd-ssl_0.17.18+0.3-3sarge1_powerpc.deb Size/MD5 checksum: 52050 bd09d568c4e634670c698dbe33cd4775 IBM S/390 architecture: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/ftpd-ssl_0.17.18+0.3-3sarge1_s390.deb Size/MD5 checksum: 51862 d4cb84830ca8a631ed5e08344e286b18 Sun Sparc architecture: http://security.debian.org/pool/updates/main/l/linux-ftpd-ssl/ftpd-ssl_0.17.18+0.3-3sarge1_sparc.deb Size/MD5 checksum: 48822 d47e7a161940d64f82a7edb87df7ff3e -- Debian GNU/Linux unstable alias sid -- The vulnerability will be fixed soon. ORIGINAL ADVISORY: http://www.debian.org/security/2005/dsa-896 OTHER REFERENCES: SA17465: http://secunia.com/advisories/17465/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------