---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Debian update for gsambad SECUNIA ADVISORY ID: SA25914 VERIFY ADVISORY: http://secunia.com/advisories/25914/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for gsambad. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. For more information: SA25909 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1.diff.gz Size/MD5 checksum: 24766 8ac63c3ecf53c7243f6f8675d3e2bb48 http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1.dsc Size/MD5 checksum: 609 35dc69c7f48b6b327b782d310037eac6 http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4.orig.tar.gz Size/MD5 checksum: 385776 ced255218e024b43de6d42c9fc1653d2 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_alpha.deb Size/MD5 checksum: 109878 5aadc8c608d516df18c4bffb0cee70a9 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_amd64.deb Size/MD5 checksum: 92416 9f332e4530c72917193402535c9f83e4 arm architecture (ARM) http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_arm.deb Size/MD5 checksum: 88570 7f540eb27987fe1d8130279f1a3f41e1 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_i386.deb Size/MD5 checksum: 93918 4f47a220caba72b7daadf205545dd214 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_ia64.deb Size/MD5 checksum: 120170 68f5483b3c10a787b7d8c6f3a7a39a34 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_mipsel.deb Size/MD5 checksum: 87426 7f4408ddd5cb502067dcea364344cfe8 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_powerpc.deb Size/MD5 checksum: 92822 4995be1a528256e86bb254dee1b0cc0f s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_s390.deb Size/MD5 checksum: 85148 8ad37130b346472026e0171d09036729 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_sparc.deb Size/MD5 checksum: 87174 b4a354e57e38c7dcaad14bff8a183975 -- Debian GNU/Linux unstable alias sid -- Reportedly, this will be fixed soon. ORIGINAL ADVISORY: http://www.debian.org/security/2007/dsa-1327 OTHER REFERENCES: SA25909: http://secunia.com/advisories/25909/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------