TITLE: Debian update for smstools SECUNIA ADVISORY ID: SA18357 VERIFY ADVISORY: http://secunia.com/advisories/18357/ CRITICAL: Less critical IMPACT: Privilege escalation, DoS WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for smstools. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially to gain escalated privileges. For more information: SA18343 SOLUTION: Apply updated packages. http://security.debian.org/pool/updates/main/s/smstools/ -- Debian GNU/Linux 3.1 alias sarge -- Source archives: smstools_1.14.8-1sarge0.diff.gz Size/MD5 checksum: 5106 ef55852ce6da003ef5f45df6eed1a8c5 smstools_1.14.8-1sarge0.dsc Size/MD5 checksum: 624 1e69b0c4a20ce7f08bce8a8b51b8504d smstools_1.14.8.orig.tar.gz Size/MD5 checksum: 158423 85b342e53d7fdde89ef25ad21e1c5fe0 Alpha architecture: smstools_1.14.8-1sarge0_alpha.deb Size/MD5 checksum: 184268 59ca41ecd61cc94de2b63c8698464732 AMD64 architecture: smstools_1.14.8-1sarge0_amd64.deb Size/MD5 checksum: 178130 f957b798e9de3075e013521bbf6241d6 ARM architecture: smstools_1.14.8-1sarge0_arm.deb Size/MD5 checksum: 173506 aa2b0df1d47ad50070aebacc266f729d HP Precision architecture: smstools_1.14.8-1sarge0_hppa.deb Size/MD5 checksum: 180032 168dba93586bc10214fbb6a5914f962e Intel IA-32 architecture: smstools_1.14.8-1sarge0_i386.deb Size/MD5 checksum: 166816 aee3afc84707f7190c255ed3739c2958 Intel IA-64 architecture: smstools_1.14.8-1sarge0_ia64.deb Size/MD5 checksum: 201440 9868ead0f8885bc3851137b23d76877d Motorola 680x0 architecture: smstools_1.14.8-1sarge0_m68k.deb Size/MD5 checksum: 166452 d713ee667bee3c3186ba477f9d0f91a8 Big endian MIPS architecture: smstools_1.14.8-1sarge0_mips.deb Size/MD5 checksum: 182332 846d0a829680db2b3662982c9fe49d4f Little endian MIPS architecture: smstools_1.14.8-1sarge0_mipsel.deb Size/MD5 checksum: 182004 db7200f1504ea22681e23e749435c22a PowerPC architecture: smstools_1.14.8-1sarge0_powerpc.deb Size/MD5 checksum: 172100 183e00f44548fce56df228441593bb90 IBM S/390 architecture: smstools_1.14.8-1sarge0_s390.deb Size/MD5 checksum: 179978 ab77f608c71a908bc51e7781b51c416d Sun Sparc architecture: smstools_1.14.8-1sarge0_sparc.deb Size/MD5 checksum: 175994 a03ff752a8910e397e73f53649c5a931 -- Debian GNU/Linux unstable alias sid -- The vulnerability will reportedly be fixed soon. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00001.html OTHER REFERENCES: SA18343: http://secunia.com/advisories/18343/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------