---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Debian update for links SECUNIA ADVISORY ID: SA23188 VERIFY ADVISORY: http://secunia.com/advisories/23188/ CRITICAL: Moderately critical IMPACT: Manipulation of data, Exposure of system information, Exposure of sensitive information WHERE: >From local network OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for links. This fixes a vulnerability, which can be exploited by malicious people to expose sensitive information and manipulate data. For more information: SA22905 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1.dsc Size/MD5 checksum: 628 a1ac1c1549a102a35398b6453df8cf03 http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1.diff.gz Size/MD5 checksum: 8329 5898f75988aba793e9559295996289ef http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12.orig.tar.gz Size/MD5 checksum: 597848 c262b08c822a582bbc992e3730f43336 Architecture independent components: http://security.debian.org/pool/updates/main/l/links/links-ssl_0.99+1.00pre12-1sarge1_all.deb Size/MD5 checksum: 5460 d983ff06f50743eefc590e13b881c649 Alpha architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_alpha.deb Size/MD5 checksum: 441038 6d3f4dbcdb63455d1a7c6c573c0a2cb0 AMD64 architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_amd64.deb Size/MD5 checksum: 396200 13443385aff64d07c142561684d3698d ARM architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_arm.deb Size/MD5 checksum: 376692 90dc38882cee571a605ea4c1b312101f HP Precision architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_hppa.deb Size/MD5 checksum: 416286 1a0e7cd0c9885a5a47f89feecdeea13a Intel IA-32 architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_i386.deb Size/MD5 checksum: 385186 a99be183941d62c33bd7d0f49c1856cb Intel IA-64 architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_ia64.deb Size/MD5 checksum: 524446 e68877303d408b3b730e703c6d78f709 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_m68k.deb Size/MD5 checksum: 343786 51765dbe4d8788b4f4219c6f71461579 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_mips.deb Size/MD5 checksum: 412208 f3272fc9e06d0ad0bed4c2d2816502fe Little endian MIPS architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_mipsel.deb Size/MD5 checksum: 408254 70f5c450fd225ea6a82befeb3d6aeeab PowerPC architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_powerpc.deb Size/MD5 checksum: 396926 b0cbccacc3632be2d3eb97cea74ea6d8 IBM S/390 architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_s390.deb Size/MD5 checksum: 390546 2def4e695f30d34bb03a0592f5deee5b Sun Sparc architecture: http://security.debian.org/pool/updates/main/l/links/links_0.99+1.00pre12-1sarge1_sparc.deb Size/MD5 checksum: 379836 be1bae25603d4a50cf854a6b6b075960 -- Debian GNU/Linux unstable alias sid -- Fixed in version 0.99+1.00pre12-1.1. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00327.html OTHER REFERENCES: SA22905: http://secunia.com/advisories/22905/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------