---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: Debian update for moin SECUNIA ADVISORY ID: SA33716 VERIFY ADVISORY: http://secunia.com/advisories/33716/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/advisories/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/advisories/product/530/ DESCRIPTION: Debian has issued an update for moin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. For more information: SA33593 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3-1.2etch2.diff.gz Size/MD5 checksum: 40914 139bcec334ed7fbf1ca2bef3c89a8377 http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3.orig.tar.gz Size/MD5 checksum: 4187091 e95ec46ee8de9527a39793108de22f7d http://security.debian.org/pool/updates/main/m/moin/moin_1.5.3-1.2etch2.dsc Size/MD5 checksum: 671 7b24d6f694511840a0a9da0c9f33f5ad Architecture independent packages: http://security.debian.org/pool/updates/main/m/moin/python-moinmoin_1.5.3-1.2etch2_all.deb Size/MD5 checksum: 914904 ab6158ae7010c3701859ceb26bd61bd2 http://security.debian.org/pool/updates/main/m/moin/moinmoin-common_1.5.3-1.2etch2_all.deb Size/MD5 checksum: 1595112 a46561072eb0ee26ee1a71275c0e64b3 -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.8.1-1.1. ORIGINAL ADVISORY: DSA-1715-1: http://lists.debian.org/debian-security-announce/2009/msg00023.html OTHER REFERENCES: SA33593: http://secunia.com/advisories/33593/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------