---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_vacancies/ Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/ ---------------------------------------------------------------------- TITLE: Debian update for gnomemeeting and ekiga SECUNIA ADVISORY ID: SA24379 VERIFY ADVISORY: http://secunia.com/advisories/24379/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for gnomemeeting and ekiga. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. For more information: SA24194 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1.dsc Size/MD5 checksum: 1746 e82643f764d6b43c521cca39a387e8f8 http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1.diff.gz Size/MD5 checksum: 22888 194f7471c22e1c81d5ab4325603e0cd1 http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1.orig.tar.gz Size/MD5 checksum: 5525398 93829f3eee783f32eaefebc9e717fb89 Alpha architecture: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_alpha.deb Size/MD5 checksum: 3146922 f500df544b335593a2bb9431cbd21592 AMD64 architecture: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_amd64.deb Size/MD5 checksum: 3119044 672fbec91d13256a46a8803486a03346 ARM architecture: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_arm.deb Size/MD5 checksum: 3089174 45beb5e78751eddbb13bd812b464cfb2 HP Precision architecture: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_hppa.deb Size/MD5 checksum: 3119086 7f92e053556ba684c120aa83c7a7c114 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_i386.deb Size/MD5 checksum: 3105396 4883efb8f1da3aa1641e249f50030f10 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_ia64.deb Size/MD5 checksum: 3192488 393b4321afb3e4077a3958d686fa02a1 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_m68k.deb Size/MD5 checksum: 3080404 d9663a63d7077b2a0cd81722a44e53d0 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_mips.deb Size/MD5 checksum: 3131084 2c7367aabe62f5f9169fc81ea217c448 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_mipsel.deb Size/MD5 checksum: 3123832 ca06f5a2993f0b1ded5834ed1077e969 PowerPC architecture: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_powerpc.deb Size/MD5 checksum: 3103054 22b5b85dd549856800375f06cfc0dfa6 IBM S/390 architecture: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_s390.deb Size/MD5 checksum: 3110952 bcf48d4d889661c1659c1afcbeaa2d24 Sun Sparc architecture: http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_sparc.deb Size/MD5 checksum: 3093420 1d6df4cf0981cf802be3d9b06075ec41 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.0.3-2.1 of the ekiga package. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00017.html OTHER REFERENCES: SA24194: http://secunia.com/advisories/24194/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------