---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Debian update for horde3 SECUNIA ADVISORY ID: SA31959 VERIFY ADVISORY: http://secunia.com/advisories/31959/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/advisories/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/advisories/product/530/ DESCRIPTION: Debian has issued an update for horde3. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. For more information see vulnerability #1 in: SA31842 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch4.dsc Size/MD5 checksum: 1076 2f84d0bcc79176fd975a2e33402c1a3f http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3.orig.tar.gz Size/MD5 checksum:5232958 fbc56c608ac81474b846b1b4b7bb5ee7 http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch4.diff.gz Size/MD5 checksum:13225 c1a2fd542348e7b1110dd76b3077620b Architecture independent packages: http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch4_all.deb Size/MD5 checksum:5259800 6a9bee45882c4613788e7f51648ca24b -- Debian GNU/Linux unstable alias sid -- Reportedly, the problem will be fixed soon. ORIGINAL ADVISORY: DSA-1642-1: http://lists.debian.org/debian-security-announce/2008/msg00231.html OTHER REFERENCES: SA31842: http://secunia.com/advisories/31842/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------