---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_vacancies/ Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/ ---------------------------------------------------------------------- TITLE: Mandriva update for libwpd SECUNIA ADVISORY ID: SA24580 VERIFY ADVISORY: http://secunia.com/advisories/24580/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for libwpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library. For more information: SA24507 SOLUTION: Apply updated packages. Mandriva Linux 2007 dc542d5d0287c5fc7d032c8bb8739f76 2007.0/i586/libwpd-0.8_8-0.8.6-1.1mdv2007.0.i586.rpm 049c74e8e8d5ea73aab2f986dd9ce75a 2007.0/i586/libwpd-0.8_8-devel-0.8.6-1.1mdv2007.0.i586.rpm b52f1c37150bdea7ff484ef4aaf1791a 2007.0/i586/libwpd-tools-0.8.6-1.1mdv2007.0.i586.rpm efde71d904604af261dae41949d6f314 2007.0/SRPMS/libwpd-0.8.6-1.1mdv2007.0.src.rpm Mandriva Linux 2007/X86_64 fa400d38581ce2ea7fd18ff5f2202508 2007.0/x86_64/lib64wpd-0.8_8-0.8.6-1.1mdv2007.0.x86_64.rpm 7f5be4640b867ed6b5e6bbdd8cca4096 2007.0/x86_64/lib64wpd-0.8_8-devel-0.8.6-1.1mdv2007.0.x86_64.rpm 72743642ac95ab9acdaa7193656f6023 2007.0/x86_64/libwpd-tools-0.8.6-1.1mdv2007.0.x86_64.rpm efde71d904604af261dae41949d6f314 2007.0/SRPMS/libwpd-0.8.6-1.1mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2007:063 OTHER REFERENCES: SA24507: http://secunia.com/advisories/24507/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------