---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Trustix Update for Multiple Packages SECUNIA ADVISORY ID: SA22898 VERIFY ADVISORY: http://secunia.com/advisories/22898/ CRITICAL: Moderately critical IMPACT: Security Bypass, DoS, System access WHERE: >From remote OPERATING SYSTEM: Trustix Secure Linux 2.2 http://secunia.com/product/4641/ DESCRIPTION: Trustix has issued an update for multiple packages. This fixes some vulnerabilities and a weakness, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. For more information: SA16816 SA22671 SA22771 SOLUTION: Apply updated packages. 1d4dcde48a5a1fe2ab19495e6e808b5f 2.2/rpms/bind-9.3.2-5tr.i586.rpm bfffb44bef5aa6c2971095319d3b7a9b 2.2/rpms/bind-devel-9.3.2-5tr.i586.rpm 26374574a61e0d51682e23bf56f9239e 2.2/rpms/bind-libs-9.3.2-5tr.i586.rpm 82dc44bb35d9462ac56c0d921374b0be 2.2/rpms/bind-light-9.3.2-5tr.i586.rpm d8076c50fda7594808523e417a234544 2.2/rpms/bind-light-devel-9.3.2-5tr.i586.rpm 5001689ab4ed15e5d636a4c1d851792d 2.2/rpms/bind-utils-9.3.2-5tr.i586.rpm 9ca9e32b1a1f51d9656fb9b156ff5085 2.2/rpms/openssh-4.5p1-1tr.i586.rpm 0c8462b001eee4c24c57038f18d04638 2.2/rpms/openssh-clients-4.5p1-1tr.i586.rpm 89ac4db62996c6641dfe27897270d719 2.2/rpms/openssh-server-4.5p1-1tr.i586.rpm 061da2194491d15e15c6c72f035b4800 2.2/rpms/openssh-server-config-4.5p1-1tr.i586.rpm 2d82898ad50f90d26dd2c33460eeb80d 2.2/rpms/texinfo-4.8-1tr.i586.rpm ORIGINAL ADVISORY: http://www.trustix.org/errata/2006/0063/ OTHER REFERENCES: SA16816: http://secunia.com/advisories/16816/ SA22671: http://secunia.com/advisories/22671/ SA22771: http://secunia.com/advisories/22771/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------