---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for mutt SECUNIA ADVISORY ID: SA21124 VERIFY ADVISORY: http://secunia.com/advisories/21124/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for mutt. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. For more information: SA20810 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2.dsc Size/MD5 checksum: 775 6dded70d1b853282f90168f83a3da833 http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2.diff.gz Size/MD5 checksum: 94233 7c72a620b8772515556b986bfb93b0fb http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9.orig.tar.gz Size/MD5 checksum: 3033253 587dd1d8f44361b73b82ef64eb30c3a0 Alpha architecture: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_alpha.deb Size/MD5 checksum: 1530480 f93c6b6e3d599a00d8927cc67c1ce691 AMD64 architecture: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_amd64.deb Size/MD5 checksum: 1442518 aeb593803115ca292f2112fbf44106fc ARM architecture: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_arm.deb Size/MD5 checksum: 1420526 569e402f7715c2116d0445dedd8a419f Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_i386.deb Size/MD5 checksum: 1416838 e38785e2498fca52d8a7bbefae26fa94 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_ia64.deb Size/MD5 checksum: 1626542 2aa9e0061439f25598ce205ef680acc1 HP Precision architecture: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_hppa.deb Size/MD5 checksum: 1467244 5731fe300b59d268423108e5073c29ac Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_m68k.deb Size/MD5 checksum: 1370346 a9acf01e90144e69d06f5ab94984e3fa Big endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_mips.deb Size/MD5 checksum: 1474126 ed6c9bd33b9f3173dac03c9bc8da120a Little endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_mipsel.deb Size/MD5 checksum: 1472642 b1693682bf38da32054e638c37b6ab56 PowerPC architecture: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_powerpc.deb Size/MD5 checksum: 1446202 6226966d71933436a2909dfc9a9c57a8 IBM S/390 architecture: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_s390.deb Size/MD5 checksum: 1444064 50bcd604cf4ebe69d4bd4e11c44cdb88 Sun Sparc architecture: http://security.debian.org/pool/updates/main/m/mutt/mutt_1.5.9-2sarge2_sparc.deb Size/MD5 checksum: 1417006 056963151226667c293f13c4b8a2db88 -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.5.11+cvs20060403-2. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1108 OTHER REFERENCES: SA20810: http://secunia.com/advisories/20810/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------