TITLE: Debian update for metamail SECUNIA ADVISORY ID: SA19226 VERIFY ADVISORY: http://secunia.com/advisories/19226/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux 3.0 http://secunia.com/product/143/ DESCRIPTION: Debian has issued an update for metamail. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. For more information: SA18796 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.0 alias woody -- Source archives: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4.dsc Size/MD5 checksum: 613 6ee8aeff0f14e5d799a670fe727039c7 http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4.diff.gz Size/MD5 checksum: 333628 22588d5a91f53fdc1a6458c5519d2512 http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7.orig.tar.gz Size/MD5 checksum: 156656 c6967e9bc5d3c919764b02df24efca01 Alpha architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_alpha.deb Size/MD5 checksum: 166084 a45a36ff283de7cb3ab3e43694f90c45 ARM architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_arm.deb Size/MD5 checksum: 153404 52e740cb6dbc32c860da10010bb90571 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_i386.deb Size/MD5 checksum: 150578 4d3e962558adfd7f43859b9f7fd30450 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_ia64.deb Size/MD5 checksum: 205790 1e9d9f11ca4fbb1863db2e205d808c23 HP Precision architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_hppa.deb Size/MD5 checksum: 153406 7897b81f6f0ee82abbcf415e258d8c9d Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_m68k.deb Size/MD5 checksum: 146400 a3cc53e414d0e60e54e4ac92849b4d0d Big endian MIPS architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_mips.deb Size/MD5 checksum: 158558 82cd3b0bb263e24f0a6f7c500a01d0af Little endian MIPS architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_mipsel.deb Size/MD5 checksum: 158562 b0a037641e1fa292decffa319cf75daf PowerPC architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_powerpc.deb Size/MD5 checksum: 148694 f326ccce8fd7cf2445e0f716fcc65143 IBM S/390 architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_s390.deb Size/MD5 checksum: 151512 ad0e4e1d1ee73ac300e4f1dc07bcfb5d Sun Sparc architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_sparc.deb Size/MD5 checksum: 155492 cf37f006621cbff83fb236afd8bfc223 -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1.dsc Size/MD5 checksum: 594 3131f64cf684d62318636b8589acbc94 http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1.diff.gz Size/MD5 checksum: 340408 165af1d9cff83f10103ebddfdb90f2ad http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7.orig.tar.gz Size/MD5 checksum: 156656 c6967e9bc5d3c919764b02df24efca01 Alpha architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_alpha.deb Size/MD5 checksum: 168190 f31837660b8971eecd951def396c0379 AMD64 architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_amd64.deb Size/MD5 checksum: 160420 ff733653f1d7df67115d61fa8df86406 ARM architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_arm.deb Size/MD5 checksum: 154186 937894d91d29082fa76ffea6d54e756f Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_i386.deb Size/MD5 checksum: 148676 58b08e364eefebe313a6fb6308ed5bf9 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_ia64.deb Size/MD5 checksum: 198062 fce924b058a6b833bf18f9f2ecbc4456 HP Precision architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_hppa.deb Size/MD5 checksum: 159538 7bd1f8661de8ef52f7391022a12b023b Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_m68k.deb Size/MD5 checksum: 148334 03af976c9a4f9e84493b8740ec97d459 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_mips.deb Size/MD5 checksum: 166488 c228360db9655a46526ae72ff190d170 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_mipsel.deb Size/MD5 checksum: 166320 120c2c081b45c4d7d90a58e65a11f984 PowerPC architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_powerpc.deb Size/MD5 checksum: 160878 ada001589f143bbe6215f12507ce6c4c IBM S/390 architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_s390.deb Size/MD5 checksum: 158718 0f70d83bff2a30d8dab1d798072d4157 Sun Sparc architecture: http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_sparc.deb Size/MD5 checksum: 152086 b4776767e71f5202a4a188d032762b24 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.7-51. ORIGINAL ADVISORY: http://www.debian.org/security/2006/dsa-995 OTHER REFERENCES: SA18796: http://secunia.com/advisories/18796/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------