---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Mandriva update for xsupplicant SECUNIA ADVISORY ID: SA22641 VERIFY ADVISORY: http://secunia.com/advisories/22641/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From local network OPERATING SYSTEM: Mandriva Linux 2006 http://secunia.com/product/9020/ Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for xsupplicant. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. For more information: SA22612 SOLUTION: Apply updated packages. Mandriva Linux 2006 d35f3cee0c66c5778acd39a64e46704a 2006.0/i586/xsupplicant-1.0.1-3.1.20060mdk.i586.rpm 3df3a3e96b0be68eda96dcffd557a014 2006.0/i586/xsupplicant-doc-1.0.1-3.1.20060mdk.i586.rpm 3685820c2527d4608a2fc1722eba6b63 2006.0/SRPMS/xsupplicant-1.0.1-3.1.20060mdk.src.rpm Mandriva Linux 2006/X86_64 d2e450ac1c2f4dac7968a08a8cb2f2c4 2006.0/x86_64/xsupplicant-1.0.1-3.1.20060mdk.x86_64.rpm 6027f2b00d4d2c966bcacbdd38a6895b 2006.0/x86_64/xsupplicant-doc-1.0.1-3.1.20060mdk.x86_64.rpm 3685820c2527d4608a2fc1722eba6b63 2006.0/SRPMS/xsupplicant-1.0.1-3.1.20060mdk.src.rpm Mandriva Linux 2007 b122033612442db1eaf3795e74947a25 2007.0/i586/xsupplicant-1.2.6-1.1mdv2007.0.i586.rpm 5919e8bb474dea74a5b0e80746d3821c 2007.0/i586/xsupplicant-devel-1.2.6-1.1mdv2007.0.i586.rpm 2e890e6b58ab87e6104bbd2cbcfac297 2007.0/i586/xsupplicant-doc-1.2.6-1.1mdv2007.0.i586.rpm b126177e58162c5bbeddda641d874423 2007.0/SRPMS/xsupplicant-1.2.6-1.1mdv2007.0.src.rpm Mandriva Linux 2007/X86_64 46878703a426d4d5770c1572c397f54c 2007.0/x86_64/xsupplicant-1.2.6-1.1mdv2007.0.x86_64.rpm bdc5f953605ab0404eb1075e0cb42ac6 2007.0/x86_64/xsupplicant-devel-1.2.6-1.1mdv2007.0.x86_64.rpm 3023ec5a0ee41f083c6372add22e8444 2007.0/x86_64/xsupplicant-doc-1.2.6-1.1mdv2007.0.x86_64.rpm b126177e58162c5bbeddda641d874423 2007.0/SRPMS/xsupplicant-1.2.6-1.1mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2006:189 OTHER REFERENCES: SA22612: http://secunia.com/advisories/22612/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------