---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Debian update for pdns-recursor SECUNIA ADVISORY ID: SA29764 VERIFY ADVISORY: http://secunia.com/advisories/29764/ CRITICAL: Moderately critical IMPACT: Spoofing WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for pdns-recursor. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache. For more information: SA29584 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4-1+etch1.dsc Size/MD5 checksum: 1198 e2afc6418e2640188aed92a15d852842 http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4.orig.tar.gz Size/MD5 checksum: 171270 e35d774e3282285a59a7f8038a036b61 http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4-1+etch1.diff.gz Size/MD5 checksum:34268 21442fd6cb034c874ae2c353d1bcd968 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4-1+etch1_alpha.deb Size/MD5 checksum: 499010 6dd67b8950e778d9d2fd35114f5fc8f7 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4-1+etch1_amd64.deb Size/MD5 checksum: 418316 ef549047ec6885aa2f1b908442822c5f i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4-1+etch1_i386.deb Size/MD5 checksum: 433732 dd69d1d790baa0637d42252196efa646 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4-1+etch1_ia64.deb Size/MD5 checksum: 598084 6ea10a12ccdcca4bd7c8975dbdd84da0 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4-1+etch1_powerpc.deb Size/MD5 checksum: 434082 74ac592edef429defa9236fb4773e065 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4-1+etch1_s390.deb Size/MD5 checksum: 408786 6abd81fab60ae0f87b97d7ccaa1b098c -- Debian GNU/Linux unstable alias sid -- Fixed in version 3.1.5-1. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/2008/msg00114.html OTHER REFERENCES: SA29584: http://secunia.com/advisories/29584/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------