---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Debian update for zoph SECUNIA ADVISORY ID: SA27303 VERIFY ADVISORY: http://secunia.com/advisories/27303/ CRITICAL: Less critical IMPACT: Manipulation of data WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for zoph. This fixes a vulnerability, which can be exploited by malicious users to conduct SQL injection attacks. For more information: SA26077 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/z/zoph/zoph_0.3.3-12sarge1.dsc Size/MD5 checksum: 570 ce9957fa5af8115a5aec530aabe6847f http://security.debian.org/pool/updates/main/z/zoph/zoph_0.3.3-12sarge1.diff.gz Size/MD5 checksum: 53959 7c37d28798981a054c634cca92122199 http://security.debian.org/pool/updates/main/z/zoph/zoph_0.3.3.orig.tar.gz Size/MD5 checksum: 153902 5ff9d8e182e16d53e0511b6d51da8521 Architecture independent components: http://security.debian.org/pool/updates/main/z/zoph/zoph_0.3.3-12sarge1_all.deb Size/MD5 checksum: 172190 a185b3cba99ea4bc0f46c73b68bb5a46 -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/z/zoph/zoph_0.6-2.1etch1.dsc Size/MD5 checksum: 850 a7bf5364534ae9fb38ba70dcc371e8c6 http://security.debian.org/pool/updates/main/z/zoph/zoph_0.6-2.1etch1.diff.gz Size/MD5 checksum: 25826 c716e920cb6c9b19941af6359ecc697d http://security.debian.org/pool/updates/main/z/zoph/zoph_0.6.orig.tar.gz Size/MD5 checksum: 382577 7e139b32bd477cccf43454cb4c07c16d Architecture independent components: http://security.debian.org/pool/updates/main/z/zoph/zoph_0.6-2.1etch1_all.deb Size/MD5 checksum: 394268 147f75305b9b891fb2ab502a94be3e9e -- Debian GNU/Linux unstable alias sid -- Fixed in version 0.7.0.2-1. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00164.html OTHER REFERENCES: SA26077: http://secunia.com/advisories/26077/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------