---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for xmltooling SECUNIA ADVISORY ID: SA36855 VERIFY ADVISORY: http://secunia.com/advisories/36855/ DESCRIPTION: Debian has issued an update for xmltooling. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, cause a DoS (Denial of Service), and potentially compromise an application using the library. For more information: SA36861 SA36869 SOLUTION: Apply updated packages. -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/x/xmltooling/xmltooling_1.0-2+lenny1.dsc Size/MD5 checksum: 1457 b7a3967d272765308809a5c8d27595ed http://security.debian.org/pool/updates/main/x/xmltooling/xmltooling_1.0-2+lenny1.diff.gz Size/MD5 checksum: 8943 1317858121f3042e5cfb8367319b1c78 http://security.debian.org/pool/updates/main/x/xmltooling/xmltooling_1.0.orig.tar.gz Size/MD5 checksum: 549767 4e7c21608f0fbdcfd966263f0c350d99 Architecture independent packages: http://security.debian.org/pool/updates/main/x/xmltooling/xmltooling-schemas_1.0-2+lenny1_all.deb Size/MD5 checksum: 11910 395d8f3a32e0c75da52a27c76f05c76f http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-doc_1.0-2+lenny1_all.deb Size/MD5 checksum: 938774 bc039db5a32dd02df34bf8b5146c551e alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_alpha.deb Size/MD5 checksum: 75002 bb6a2bebec1586b842d663a55429ebb0 http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_alpha.deb Size/MD5 checksum: 799538 9cdc74e48b5fd67f300715096adf15a7 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_amd64.deb Size/MD5 checksum: 736934 2e220b0edab912f586af6c3d2538f409 http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_amd64.deb Size/MD5 checksum: 75792 3cc7822c1c88f61130fcf0d03d6e4311 arm architecture (ARM) http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_arm.deb Size/MD5 checksum: 750312 20cd9cd8bb91f2a9755e503e538a550c http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_arm.deb Size/MD5 checksum: 75082 3fbb6e674b1b729be300d6255a2729f3 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_armel.deb Size/MD5 checksum: 637366 2190e5db31659ca5c58835341f1eb6ce http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_armel.deb Size/MD5 checksum: 74554 2638c933e772f9ab2e9720f1b0436935 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_hppa.deb Size/MD5 checksum: 850440 a4e865bd4774c483559c99df549a3bfa http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_hppa.deb Size/MD5 checksum: 75102 7546f61b1564b4c5c49ad69c71c7d223 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_i386.deb Size/MD5 checksum: 74980 836fc866e7446cf594281eda1602c81f http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_i386.deb Size/MD5 checksum: 683958 4556a60904d3c09d735301cbadd463f4 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_ia64.deb Size/MD5 checksum: 74052 7168ee5c68b5d5e41ac996e3b98ba2b8 http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_ia64.deb Size/MD5 checksum: 938056 b550972c349c99aa5b11473868531a4a mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_mips.deb Size/MD5 checksum: 697412 189506c8bd9473f11e09275f613c2e61 http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_mips.deb Size/MD5 checksum: 74992 933d28c7a0bb457488bcf37442f999ef mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_mipsel.deb Size/MD5 checksum: 663610 8105a8478fe3d8a0724745c0597893e8 http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_mipsel.deb Size/MD5 checksum: 74064 e8700e64464a0cf15a5ef070b759a84c powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_powerpc.deb Size/MD5 checksum: 74072 e6444eda8c40348c9fa6025c770bf01e http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_powerpc.deb Size/MD5 checksum: 777756 2e226da34bd88e91d5615704267d9e35 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_s390.deb Size/MD5 checksum: 74040 7340da0a7d36d8c6029e8b40a75cef2b http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_s390.deb Size/MD5 checksum: 745620 0a66b47c6a055692b2467502c1158a2e sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_sparc.deb Size/MD5 checksum: 74060 4ad661aacce58a25ea2491489d23a242 http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_sparc.deb Size/MD5 checksum: 828332 eb2255da533a6bdf3876afdb11c8ca73 ORIGINAL ADVISORY: DSA-1895-1: http://lists.debian.org/debian-security-announce/2009/msg00216.html OTHER REFERENCES: SA36861: http://secunia.com/advisories/36861/ SA36869: http://secunia.com/advisories/36869/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------