---------------------------------------------------------------------- Secunia is pleased to announce the release of the annual Secunia report for 2008. Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/ Stay Secure, Secunia ---------------------------------------------------------------------- TITLE: Debian update for horde3 SECUNIA ADVISORY ID: SA34609 VERIFY ADVISORY: http://secunia.com/advisories/34609/ DESCRIPTION: Debian has issued an update for horde3. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information. For more information: SA30697 SA33521 SA33695 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3.orig.tar.gz Size/MD5 checksum: 5232958 fbc56c608ac81474b846b1b4b7bb5ee7 http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch5.diff.gz Size/MD5 checksum: 13749 d7ad332e2f535b9df1ab49bd9c7233fa http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch5.dsc Size/MD5 checksum: 1076 c6082f3a21860b6b65b7edc4c58b0c07 Architecture independent packages: http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch5_all.deb Size/MD5 checksum: 5274074 e4cfd0484345a153c33481101472a1fe -- Debian GNU/Linux unstable alias sid -- Fixed in version 3.2.2+debian0-2. ORIGINAL ADVISORY: DSA-1765-1: http://lists.debian.org/debian-security-announce/2009/msg00075.html OTHER REFERENCES: SA30697: http://secunia.com/advisories/30697/ SA33521: http://secunia.com/advisories/33521/ SA33695: http://secunia.com/advisories/33695/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------