---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for nagios2 SECUNIA ADVISORY ID: SA36666 VERIFY ADVISORY: http://secunia.com/advisories/36666/ DESCRIPTION: Debian has issued an update for nagios2. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. For more information: SA27316 SA30283 SA29363 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4.diff.gz Size/MD5 checksum: 35589 5aee898df4f6ea4a0fa4a1fb22390a0b http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6.orig.tar.gz Size/MD5 checksum: 1734400 a032edba07bf389b803ce817e9406c02 http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4.dsc Size/MD5 checksum: 948 a4bd33d2bd5c812b5c9899fc41651e37 Architecture independent packages: http://security.debian.org/pool/updates/main/n/nagios2/nagios2-doc_2.6-2+etch4_all.deb Size/MD5 checksum: 1149816 8b2d0a07cd650edc3e6d33f74b480cb2 http://security.debian.org/pool/updates/main/n/nagios2/nagios2-common_2.6-2+etch4_all.deb Size/MD5 checksum: 59416 f70cd9aa86a0eb1b64a914b40da984cd alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_alpha.deb Size/MD5 checksum: 1222136 4dc7d3e1230632930471fb0e0dcbd496 http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_alpha.deb Size/MD5 checksum: 1702766 6ff7f9e7bb6cdaa0cea2fb0dfe35ae72 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_amd64.deb Size/MD5 checksum: 1687984 4c28fa0a9fa9883cdff1e038c56924e0 http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_amd64.deb Size/MD5 checksum: 1097788 31afdb67e26e5f1a56a9da11117a1452 arm architecture (ARM) http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_arm.deb Size/MD5 checksum: 1537452 4e4d636a0699cf9f714a522885894a4e http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_arm.deb Size/MD5 checksum: 1023982 fb3a8f2b2b592bafcf1830172a7d5a8e hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_hppa.deb Size/MD5 checksum: 1148976 c875e0ab58ca0f39bf34b1704cc4a969 http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_hppa.deb Size/MD5 checksum: 1622072 e002a9c7703542bd8aa8e509238ba29c i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_i386.deb Size/MD5 checksum: 1587836 778bd65bfb6cfb1f3f0efcb872a32360 http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_i386.deb Size/MD5 checksum: 1016950 720d00ef27782b51c0b7e675c2f82309 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_ia64.deb Size/MD5 checksum: 1623324 1a157461c15e81c93670ad92c3792b69 http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_ia64.deb Size/MD5 checksum: 1711252 762d02684f9db0f34c92bd7d7b6ebbcf mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_mips.deb Size/MD5 checksum: 1105228 bdc34a55e69e12061ee6ea274f111c78 http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_mips.deb Size/MD5 checksum: 1710346 4cbc8945fe0fbcaa241a9abe3790205c mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_mipsel.deb Size/MD5 checksum: 1663580 46330520785afa00addcf8f97dbef312 http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_mipsel.deb Size/MD5 checksum: 1104930 b5a2ee4c401e8e498ae0d4e087e2be8e powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_powerpc.deb Size/MD5 checksum: 1088364 ffa92a52851e793f11a63b4e56767e9e http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_powerpc.deb Size/MD5 checksum: 1667356 9418e0cf94e1499f46728c5376402b90 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/n/nagios2/nagios2_2.6-2+etch4_sparc.deb Size/MD5 checksum: 988232 9aec288a67ae036df5da714ea72ee19f http://security.debian.org/pool/updates/main/n/nagios2/nagios2-dbg_2.6-2+etch4_sparc.deb Size/MD5 checksum: 1484954 8b8e2ee9598191fd5f30132e8d87ebe1 ORIGINAL ADVISORY: DSA 1883-1: http://lists.debian.org/debian-security-announce/2009/msg00202.html OTHER REFERENCES: SA27316: http://secunia.com/advisories/27316/ SA30283: http://secunia.com/advisories/30283/ SA29363: http://secunia.com/advisories/29363/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------