---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Ubuntu update for libmodplug SECUNIA ADVISORY ID: SA26979 VERIFY ADVISORY: http://secunia.com/advisories/26979/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Ubuntu Linux 6.06 http://secunia.com/product/10611/ Ubuntu Linux 6.10 http://secunia.com/product/12470/ DESCRIPTION: Ubuntu has issued an update for libmodplug. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. For more information: SA22658 SOLUTION: Apply updated packages. -- Ubuntu 6.06 LTS -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug_0.7-5ubuntu0.6.06.1.diff.gz Size/MD5: 7132 5ea7bde5b33470ae5adfcc8f977d051a http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug_0.7-5ubuntu0.6.06.1.dsc Size/MD5:640 0c363a061dd31dd1e3ab86f6306a8124 http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug_0.7.orig.tar.gz Size/MD5: 329398 b6e7412f90cdd4a27a2dd3de94909905 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug-dev_0.7-5ubuntu0.6.06.1_all.deb Size/MD5:22350 43bf0cad64c5b99dc298fa0ce3f3db44 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug0c2_0.7-5ubuntu0.6.06.1_amd64.deb Size/MD5: 117402 feeebd679f9355fdf259c1014313dc4a i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug0c2_0.7-5ubuntu0.6.06.1_i386.deb Size/MD5: 115238 ef9c9fdd542ca9b1573cc383d3b0ddfd powerpc architecture (Apple Macintosh G3/G4/G5): http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug0c2_0.7-5ubuntu0.6.06.1_powerpc.deb Size/MD5: 125616 eeb2f3baef12ae5883e3e3aff0082d16 sparc architecture (Sun SPARC/UltraSPARC): http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug0c2_0.7-5ubuntu0.6.06.1_sparc.deb Size/MD5: 123276 3242bdcb39748d212d127d21e2aac864 -- Ubuntu 6.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug_0.7-5ubuntu0.6.10.1.diff.gz Size/MD5: 7129 a5eb16cd1823bd7bf9fe12f93583d363 http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug_0.7-5ubuntu0.6.10.1.dsc Size/MD5:640 4673f3d2ab6676f7c14686d9fe34294f http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug_0.7.orig.tar.gz Size/MD5: 329398 b6e7412f90cdd4a27a2dd3de94909905 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug-dev_0.7-5ubuntu0.6.10.1_all.deb Size/MD5:22384 bc58f46270dfc27b538a87279a76eac7 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug0c2_0.7-5ubuntu0.6.10.1_amd64.deb Size/MD5: 116602 a328b8a1d89690e1ecd3fc51029a136d i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug0c2_0.7-5ubuntu0.6.10.1_i386.deb Size/MD5: 118066 c88fcf05eaf8df6c5cb9c2decf77eefe powerpc architecture (Apple Macintosh G3/G4/G5): http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug0c2_0.7-5ubuntu0.6.10.1_powerpc.deb Size/MD5: 125326 9606b0cda577aa03f7425f4fa6a98e48 sparc architecture (Sun SPARC/UltraSPARC): http://security.ubuntu.com/ubuntu/pool/main/libm/libmodplug/libmodplug0c2_0.7-5ubuntu0.6.10.1_sparc.deb Size/MD5: 124146 42842bc6847b1900c8c1964b42ae8454 ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-521-1 OTHER REFERENCES: SA22658: http://secunia.com/advisories/22658/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------