---------------------------------------------------------------------- Did you know? Our assessment and impact rating along with detailed information such as exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Debian update for squid3 SECUNIA ADVISORY ID: SA34078 VERIFY ADVISORY: http://secunia.com/advisories/34078/ DESCRIPTION: Debian has issued an update for squid3. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA33731 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/s/squid3/squid3_3.0.PRE5.orig.tar.gz Size/MD5 checksum: 3061614 35cc83c17afb17c4718ffc8d0d71bcae http://security.debian.org/pool/updates/main/s/squid3/squid3_3.0.PRE5-5+etch1.diff.gz Size/MD5 checksum: 13354 4993554616685c3596d9f96eb12d53c1 http://security.debian.org/pool/updates/main/s/squid3/squid3_3.0.PRE5-5+etch1.dsc Size/MD5 checksum: 735 98fac484b56ec7ee5f69ad6336656e28 Architecture independent packages: http://security.debian.org/pool/updates/main/s/squid3/squid3-common_3.0.PRE5-5+etch1_all.deb Size/MD5 checksum: 248732 2b26e7e28cefe82d5c7a94d7cdb73c74 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/s/squid3/squid3-client_3.0.PRE5-5+etch1_alpha.deb Size/MD5 checksum: 66928 73ba707ff043dabf778d8839591ff00c http://security.debian.org/pool/updates/main/s/squid3/squid3_3.0.PRE5-5+etch1_alpha.deb Size/MD5 checksum: 887986 246a0992ee6867cba9b5bd90ae3bb167 http://security.debian.org/pool/updates/main/s/squid3/squid3-cgi_3.0.PRE5-5+etch1_alpha.deb Size/MD5 checksum: 71404 11af955fd5604bd2595fcce41e6d4632 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/s/squid3/squid3-client_3.0.PRE5-5+etch1_amd64.deb Size/MD5 checksum: 64534 3bb28edd86a31e8fdfb37551631f3da8 http://security.debian.org/pool/updates/main/s/squid3/squid3-cgi_3.0.PRE5-5+etch1_amd64.deb Size/MD5 checksum: 68328 798fa101699710b329935a78bf0cd0ea http://security.debian.org/pool/updates/main/s/squid3/squid3_3.0.PRE5-5+etch1_amd64.deb Size/MD5 checksum: 792302 78aa4fae02843d22ee8784e5f1ee87cb arm architecture (ARM) http://security.debian.org/pool/updates/main/s/squid3/squid3-client_3.0.PRE5-5+etch1_arm.deb Size/MD5 checksum: 63484 d6f2107d20788bf7dd07abb9b206172c http://security.debian.org/pool/updates/main/s/squid3/squid3_3.0.PRE5-5+etch1_arm.deb Size/MD5 checksum: 769738 10d6ac7123424be28690c2030cbf5eb7 http://security.debian.org/pool/updates/main/s/squid3/squid3-cgi_3.0.PRE5-5+etch1_arm.deb Size/MD5 checksum: 67272 2fdd845095b8fa0cb3d9574e5fdb4bcd hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/s/squid3/squid3-cgi_3.0.PRE5-5+etch1_hppa.deb Size/MD5 checksum: 69974 604c4c10f65c185b89d1cff91136a32e http://security.debian.org/pool/updates/main/s/squid3/squid3_3.0.PRE5-5+etch1_hppa.deb Size/MD5 checksum: 929058 a90594d57f20ea12d7f1cd05fab538a4 http://security.debian.org/pool/updates/main/s/squid3/squid3-client_3.0.PRE5-5+etch1_hppa.deb Size/MD5 checksum: 66514 961004e071bff449058b1fcbbf11910c i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/s/squid3/squid3-client_3.0.PRE5-5+etch1_i386.deb Size/MD5 checksum: 64442 8f93ed7979e6346f09240bda0f8397fb http://security.debian.org/pool/updates/main/s/squid3/squid3_3.0.PRE5-5+etch1_i386.deb Size/MD5 checksum: 743098 85d673af4e6a9451acca3e519a057727 http://security.debian.org/pool/updates/main/s/squid3/squid3-cgi_3.0.PRE5-5+etch1_i386.deb Size/MD5 checksum: 68450 b4b71002a819ed312b5049f52f6b26af ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/s/squid3/squid3_3.0.PRE5-5+etch1_ia64.deb Size/MD5 checksum: 1185186 d0a0f2f96cdcaa68f64fb712e60e388a http://security.debian.org/pool/updates/main/s/squid3/squid3-cgi_3.0.PRE5-5+etch1_ia64.deb Size/MD5 checksum: 76120 59e1000682f659bd8c279cdbb03aabbe http://security.debian.org/pool/updates/main/s/squid3/squid3-client_3.0.PRE5-5+etch1_ia64.deb Size/MD5 checksum: 70344 70082e6f0d055c6fbc5bb659d291a59c mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/s/squid3/squid3-cgi_3.0.PRE5-5+etch1_mipsel.deb Size/MD5 checksum: 70014 2776662dce0de56454d4e19525c616fa http://security.debian.org/pool/updates/main/s/squid3/squid3_3.0.PRE5-5+etch1_mipsel.deb Size/MD5 checksum: 911840 16122bd2616f77ac6019dc142fe64157 http://security.debian.org/pool/updates/main/s/squid3/squid3-client_3.0.PRE5-5+etch1_mipsel.deb Size/MD5 checksum: 66332 1e67fe985396c482e963876626975523 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/s/squid3/squid3-cgi_3.0.PRE5-5+etch1_powerpc.deb Size/MD5 checksum: 69072 311a6d89f5e29f14319fde9d7aee364c http://security.debian.org/pool/updates/main/s/squid3/squid3_3.0.PRE5-5+etch1_powerpc.deb Size/MD5 checksum: 819050 28e74d4371d39fa553c1ecacb282c7a3 http://security.debian.org/pool/updates/main/s/squid3/squid3-client_3.0.PRE5-5+etch1_powerpc.deb Size/MD5 checksum: 64818 35cbc5e8ebd78dc0294750d2e2d32d7a s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/s/squid3/squid3_3.0.PRE5-5+etch1_s390.deb Size/MD5 checksum: 787254 1303b619f1b56d7908fea5308c88669c http://security.debian.org/pool/updates/main/s/squid3/squid3-client_3.0.PRE5-5+etch1_s390.deb Size/MD5 checksum: 65164 cc13b2a7b237ff84219a65760a8cca95 http://security.debian.org/pool/updates/main/s/squid3/squid3-cgi_3.0.PRE5-5+etch1_s390.deb Size/MD5 checksum: 69104 de5334329dbad3f151a6322b9ec6d2d0 -- Debian GNU/Linux unstable alias sid -- Fixed in version 3.0.STABLE8-3. ORIGINAL ADVISORY: DSA-1732-1: http://lists.debian.org/debian-security-announce/2009/msg00042.html OTHER REFERENCES: SA33731: http://secunia.com/advisories/33731/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------