---------------------------------------------------------------------- Reverse Engineer Wanted Secunia offers a Security Specialist position with emphasis on reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports. http://secunia.com/secunia_security_specialist/ ---------------------------------------------------------------------- TITLE: Ubuntu update for libmms SECUNIA ADVISORY ID: SA20964 VERIFY ADVISORY: http://secunia.com/advisories/20964/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Ubuntu Linux 5.10 http://secunia.com/product/6606/ DESCRIPTION: Ubuntu has issued an update for libmms. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. For more information: SA20749 SOLUTION: Apply updated packages. Source archives: http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms_0.1-0ubuntu1.1.diff.gz Size/MD5: 4933 76da674c4ce46f604acb09b473f72f1d http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms_0.1-0ubuntu1.1.dsc Size/MD5: 607 3f7b2613ed4bda8a5d943141aa85d2d5 http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms_0.1.orig.tar.gz Size/MD5: 317089 ebd88537af9875265e41ee65603ecd1a amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms-dev_0.1-0ubuntu1.1_amd64.deb Size/MD5: 19656 5f4757ce0808238ce09df147b0a16251 http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms0_0.1-0ubuntu1.1_amd64.deb Size/MD5: 16042 bd2e57f384bad19a121b3d93c6ff7ec8 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms-dev_0.1-0ubuntu1.1_i386.deb Size/MD5: 18078 30ea92c953e77a62cea90060c5ffe195 http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms0_0.1-0ubuntu1.1_i386.deb Size/MD5: 14840 645668e9bf1b15cd3e7993bc8e66c6bd powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms-dev_0.1-0ubuntu1.1_powerpc.deb Size/MD5: 20206 ee2b12725fcaaaae1f2eb94a4fbf6e10 http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms0_0.1-0ubuntu1.1_powerpc.deb Size/MD5: 17700 013e1564d0aa094eddf28ae0723e264b sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms-dev_0.1-0ubuntu1.1_sparc.deb Size/MD5: 19894 b0e5d23a750dad2a0e2fa528e4ba9e02 http://security.ubuntu.com/ubuntu/pool/main/libm/libmms/libmms0_0.1-0ubuntu1.1_sparc.deb Size/MD5: 16176 3246a55286c83b1ff2b3a6fc47ee4241 ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-309-1 OTHER REFERENCES: SA20749: http://secunia.com/advisories/20749 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------