---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Debian update for screen SECUNIA ADVISORY ID: SA22647 VERIFY ADVISORY: http://secunia.com/advisories/22647/ CRITICAL: Less critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for screen. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. For more information: SA22583 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1.dsc Size/MD5 checksum: 636 e49dbc2f884aef5f5be87ee4e81c3d83 http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1.diff.gz Size/MD5 checksum: 33782 659bf15bbbb31817ebad9372c8827618 http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2.orig.tar.gz Size/MD5 checksum: 840519 ed68ea9b43d9fba0972cb017a24940a1 Alpha architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_alpha.deb Size/MD5 checksum: 629958 ed0ff830958e515c4cfe7578c3cbd43b AMD64 architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_amd64.deb Size/MD5 checksum: 599552 c6b981d25812347be756677294dbb91e ARM architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_arm.deb Size/MD5 checksum: 588386 a6a0e9b44c193c70207977a0a850a33c HP Precision architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_hppa.deb Size/MD5 checksum: 605298 312f40458406384986d369c69fec651f Intel IA-32 architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_i386.deb Size/MD5 checksum: 581822 0d04f818e84bba320ae7af77463a83f3 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_ia64.deb Size/MD5 checksum: 682540 f1ffda25938b5e08e80ed581a24a0311 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_m68k.deb Size/MD5 checksum: 560314 693600b1df1c4a87f281365a1102d780 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_mips.deb Size/MD5 checksum: 603124 4eb62645164745cbb946539e0c11af7c Little endian MIPS architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_mipsel.deb Size/MD5 checksum: 603336 8225a911fb5206aefafc8bd16813ce48 PowerPC architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_powerpc.deb Size/MD5 checksum: 593248 8fab93a81f23a478171c8dab6b21bc78 IBM S/390 architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_s390.deb Size/MD5 checksum: 597560 5bb4d6445f7e433f8adab4b33e9e51fc ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1202 OTHER REFERENCES: SA22583: http://secunia.com/advisories/22583/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------