---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for wordpress SECUNIA ADVISORY ID: SA36316 VERIFY ADVISORY: http://secunia.com/advisories/36316/ DESCRIPTION: Debian has issued an update for wordpress. This fixes some vulnerabilities, which can be exploited by malicious users to perform certain actions with escalated privileges and compromise a vulnerable system, and by malicious people to guess automatically generated passwords and conduct script insertion attacks. For more information: SA29949 SA31737 SA35946 SA36146 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch5.dsc Size/MD5 checksum: 607 303f4e7e168c04dddd64ae2b7300337e http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10.orig.tar.gz Size/MD5 checksum: 520314 e9d5373b3c6413791f864d56b473dd54 http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch5.diff.gz Size/MD5 checksum: 51120 9dcee118356aa6950bd4b994b6c11def Architecture independent packages: http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch5_all.deb Size/MD5 checksum: 521174 18a19046fd5707ea64745818a5a673f6 -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1-11+lenny1.dsc Size/MD5 checksum: 1051 46d9daad717f36918e2709757523f6eb http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1.orig.tar.gz Size/MD5 checksum: 1181886 b1a40387006e54dcbd963d0cb5da0df4 http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1-11+lenny1.diff.gz Size/MD5 checksum: 702119 07658ad36bed8829f58b1b6223eac294 Architecture independent packages: http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1-11+lenny1_all.deb Size/MD5 checksum: 1029028 2d30e38e22761f87e23d2c85120bb1ff CHANGELOG: 2009-08-27: Added new updated packages for Debian 4.0. ORIGINAL ADVISORY: DSA-1871-1: http://lists.debian.org/debian-security-announce/2009/msg00188.html DSA 1871-2: http://lists.debian.org/debian-security-announce/2009/msg00193.html OTHER REFERENCES: SA29949: http://secunia.com/advisories/29949/ SA31737: http://secunia.com/advisories/31737/ SA35946: http://secunia.com/advisories/35946/ SA36146: http://secunia.com/advisories/36146/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------