---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for djbdns SECUNIA ADVISORY ID: SA35820 VERIFY ADVISORY: http://secunia.com/advisories/35820/ DESCRIPTION: Debian has issued an update for djbdns. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data. For more information: SA33855 SOLUTION: Apply updated packages. -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05.orig.tar.gz Size/MD5 checksum: 85648 3147c5cd56832aa3b41955c7a51cbeb2 http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1.dsc Size/MD5 checksum: 1237 b7dc377faa3cc915a4fc4c831188c536 http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1.diff.gz Size/MD5 checksum: 52796 aa741f98a1c7d7b64f49b3ec3d69646d Architecture independent packages: http://security.debian.org/pool/updates/main/d/djbdns/dnscache-run_1.05-4+lenny1_all.deb Size/MD5 checksum: 11892 0f09b110a5a7ea7090dfc315a8a07195 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_alpha.deb Size/MD5 checksum: 376022 3830f80ce21a48e88b7e0c633e49dceb http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_alpha.deb Size/MD5 checksum: 468272 b0a4798d65577dd53467643d000399b6 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_amd64.deb Size/MD5 checksum: 350360 4ba6658eb89e6c077bc65d890171cc72 http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_amd64.deb Size/MD5 checksum: 280924 db6e0cf1d36bd78ddca6c5d8529cceb0 arm architecture (ARM) http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_arm.deb Size/MD5 checksum: 250172 d10532c10a8b1a97a4a80eb9fc13df4a http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_arm.deb Size/MD5 checksum: 225608 341f7d38f134999384529eeb198086a5 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_armel.deb Size/MD5 checksum: 298760 02d7ec2dd3de0f7f7f1953c2598bb66d http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_armel.deb Size/MD5 checksum: 250440 6a510480fb22b97faf94dfbb7d5abccf hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_hppa.deb Size/MD5 checksum: 365562 40bc21efebeb6e848484cbfcaac87e72 http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_hppa.deb Size/MD5 checksum: 303522 884370529609702ecc4dc362953210db i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_i386.deb Size/MD5 checksum: 269360 cb87c5c2b60dbb6e2bc30b6e47ea5beb http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_i386.deb Size/MD5 checksum: 237334 ea0f66d842ce13a6a989efb387745813 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_ia64.deb Size/MD5 checksum: 495368 fd6574844346c01adc85bb2f64f09009 http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_ia64.deb Size/MD5 checksum: 584748 dc2f804743edc82eacfd3a5a644ae77a mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_mips.deb Size/MD5 checksum: 364272 c4da4293a29d8d499aa3b22ddbce4fd1 http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_mips.deb Size/MD5 checksum: 447956 53db6801f7cae6324296f1f47eb0b86c mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_mipsel.deb Size/MD5 checksum: 363136 2a77e576d2bd8129659a0abe4944b877 http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_mipsel.deb Size/MD5 checksum: 446700 2bafbc1dc76d470484ab108e92b7dae2 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_powerpc.deb Size/MD5 checksum: 270750 3ee59ee9320d6a205c4a8decaa40f542 http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_powerpc.deb Size/MD5 checksum: 332636 629f4decc315ac55e7a2704de4755358 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_s390.deb Size/MD5 checksum: 265986 2148a2f1d5f12fc444f76414a632aaea http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_s390.deb Size/MD5 checksum: 324762 5c616a1fccaf633ecb77f145b6c4f648 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/d/djbdns/dbndns_1.05-4+lenny1_sparc.deb Size/MD5 checksum: 289234 030ded000454623b720d589eaf5db8bc http://security.debian.org/pool/updates/main/d/djbdns/djbdns_1.05-4+lenny1_sparc.deb Size/MD5 checksum: 252888 18fd0b54b12a8d65a9aeb41b11b78e85 ORIGINAL ADVISORY: DSA-1831-1: http://lists.debian.org/debian-security-announce/2009/msg00144.html OTHER REFERENCES: SA33855: http://secunia.com/advisories/33855/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------