---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for isakmpd SECUNIA ADVISORY ID: SA21905 VERIFY ADVISORY: http://secunia.com/advisories/21905/ CRITICAL: Moderately critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for isakmpd. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. For more information: SA21652 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1.dsc Size/MD5 checksum: 661 35e8865c2759c66f01c0563a4bdfc124 http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1.diff.gz Size/MD5 checksum: 68877 90e47af5080893c9ccf7d38aebef6760 http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012.orig.tar.gz Size/MD5 checksum: 373941 e6d25a9e232fb186e1a48dc06453bd57 Alpha architecture: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_alpha.deb Size/MD5 checksum: 708414 e6894a5a6c7a4586f2c22d28cd0a8f84 AMD64 architecture: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_amd64.deb Size/MD5 checksum: 544652 43df55b5251b4cbb2bf3c4fe3528827f ARM architecture: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_arm.deb Size/MD5 checksum: 473492 92e5b4ae0fbbb14104d39fe0b1a24597 HP Precision architecture: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_hppa.deb Size/MD5 checksum: 535124 d97d6a0357c332c72a8ac313a7f1c301 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_i386.deb Size/MD5 checksum: 497670 0a58ae7ef43c38853a58d430389d1840 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_ia64.deb Size/MD5 checksum: 786026 f8e473ef442260b13076aa6add875c99 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_m68k.deb Size/MD5 checksum: 421268 3f57254cfdded5e2615f4c3b277133e9 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_mips.deb Size/MD5 checksum: 568914 cf14999a58edbb20545d8a63f7311f87 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_mipsel.deb Size/MD5 checksum: 567060 38fca5d17f6be2c843f92aed15ac3830 PowerPC architecture: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_powerpc.deb Size/MD5 checksum: 555978 f3786f6d0f4e556587b372a753184cca IBM S/390 architecture: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_s390.deb Size/MD5 checksum: 548240 e9cbc0d97b19aac56686d7384de1c219 Sun Sparc architecture: http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_sparc.deb Size/MD5 checksum: 514166 7318cf5d5f419d5d00b45faf6d5bc3e1 -- Debian GNU/Linux unstable alias sid -- Fixed in version 20041012-4. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1175 OTHER REFERENCES: SA21652: http://secunia.com/advisories/21652/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------