TITLE: Debian update for ilohamail SECUNIA ADVISORY ID: SA19266 VERIFY ADVISORY: http://secunia.com/advisories/19266/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for ilohamail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct script insertion attacks. For more information: SA14957 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/i/ilohamail/ilohamail_0.8.14-0rc3sarge1.dsc Size/MD5 checksum: 620 d2bc31dc5387c2c8c15d1791f7705407 http://security.debian.org/pool/updates/main/i/ilohamail/ilohamail_0.8.14-0rc3sarge1.diff.gz Size/MD5 checksum: 21653 ad9a2d34c3ba983e9fa18d28589e857c http://security.debian.org/pool/updates/main/i/ilohamail/ilohamail_0.8.14.orig.tar.gz Size/MD5 checksum: 381671 d20ce048d494bbd54fcfb3e5d46f384b Architecture independent components: http://security.debian.org/pool/updates/main/i/ilohamail/ilohamail_0.8.14-0rc3sarge1_all.deb Size/MD5 checksum: 398762 2dcae76e1b8b7bdded127902c1933368 -- Debian GNU/Linux unstable alias sid -- Fixed in version 0.8.14-0rc3sarge1. ORIGINAL ADVISORY: http://www.debian.org/security/2006/dsa-1010 OTHER REFERENCES: SA14957: http://secunia.com/advisories/14957/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------