---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Ubuntu update for ekiga and gnomemeeting SECUNIA ADVISORY ID: SA24271 VERIFY ADVISORY: http://secunia.com/advisories/24271/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Ubuntu Linux 6.10 http://secunia.com/product/12470/ Ubuntu Linux 6.06 http://secunia.com/product/10611/ Ubuntu Linux 5.10 http://secunia.com/product/6606/ DESCRIPTION: Ubuntu has issued an update for ekiga and gnomemeeting. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. For more information: SA24194 SOLUTION: Apply updated packages. -- Ubuntu 5.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeeting_1.2.2-1ubuntu1.1.diff.gz Size/MD5: 12465 55f41497417828ebef140cc0670a25d6 http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeeting_1.2.2-1ubuntu1.1.dsc Size/MD5: 1811 63cc3478d280f09018f24ae55c3aa4ed http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeeting_1.2.2.orig.tar.gz Size/MD5: 6059950 65fe2d6a31e63a37c5a6217206223192 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeeting_1.2.2-1ubuntu1.1_amd64.deb Size/MD5: 1826384 b3bfbd016a2e5fdd4f54ad639bef4e9b i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeeting_1.2.2-1ubuntu1.1_i386.deb Size/MD5: 1802170 3245abb98b202c2f6e7c27760723af5c powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeeting_1.2.2-1ubuntu1.1_powerpc.deb Size/MD5: 1817502 64236066ccb7f81fddb6728b158f0415 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/g/gnomemeeting/gnomemeeting_1.2.2-1ubuntu1.1_sparc.deb Size/MD5: 1803872 4ec0f28c58259ec9bf5aac2917a542f6 -- Ubuntu 6.06 LTS -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubuntu6.1.diff.gz Size/MD5: 23489 9c1a9e42584e604667c474b441390dce http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubuntu6.1.dsc Size/MD5: 2090 3eabad082fd143a10c5b3625db75562b http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1.orig.tar.gz Size/MD5: 5572709 9f0a2bcce380677e38b23991320df171 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubuntu6.1_amd64.deb Size/MD5: 3687800 943691c7d2d27e7d3156b050772ddd04 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubuntu6.1_i386.deb Size/MD5: 3658022 fd451db8ed71af0d0caae71b0e55e7ec powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubuntu6.1_powerpc.deb Size/MD5: 3673764 423bf587f00be062ffaf7b9cd62487c4 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.1-0ubuntu6.1_sparc.deb Size/MD5: 3660784 b2ecd3a204168f67638000cd01c46a39 -- Ubuntu 6.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.3-0ubuntu3.1.diff.gz Size/MD5: 23822 fc9d0688739586606dc67efa1662070f http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.3-0ubuntu3.1.dsc Size/MD5: 1837 1da46e1bc9e1b820ee77cc32fc6c80d7 http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.3.orig.tar.gz Size/MD5: 5749938 5ad3458d73d65c6502c312ff0c430a7c amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.3-0ubuntu3.1_amd64.deb Size/MD5: 3688744 d4d26c59a8a1e90a82ad72961f3ffae8 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.3-0ubuntu3.1_i386.deb Size/MD5: 3668392 a12654dfa595f8cf37f89bf9b644dd44 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.3-0ubuntu3.1_powerpc.deb Size/MD5: 3676188 e2df269899f919673f2a7b7da7f0c8d1 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/e/ekiga/ekiga_2.0.3-0ubuntu3.1_sparc.deb Size/MD5: 3670736 26e533cdcdb7efa2e891a5a335234f16 ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-426-1 OTHER REFERENCES: SA24194: http://secunia.com/advisories/24194/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------