Secunia Security Advisory - Trustix has issued updates for multiple packages. These fix some vulnerabilities, where the most critical ones can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a user's system or vulnerable system.
01599546892c21399f97f0e095f4db3d612ad2fcebd77001ac2e3ae0007519a9
TITLE:
Trustix update for multiple packages
SECUNIA ADVISORY ID:
SA17666
VERIFY ADVISORY:
http://secunia.com/advisories/17666/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Cross Site Scripting, Privilege escalation, DoS,
System access
WHERE:
>From remote
OPERATING SYSTEM:
Trustix Secure Linux 2.2
http://secunia.com/product/4641/
DESCRIPTION:
Trustix has issued updates for multiple packages. These fix some
vulnerabilities, where the most critical ones can be exploited by
malicious people to bypass certain security restrictions, cause a DoS
(Denial of Service), and compromise a user's system or vulnerable
system.
For more information:
SA15390
SA16971
SA17318
SA17371
SA17372
SA17386
SOLUTION:
Apply updated packages.
Trustix Secure Linux 2.2:
24f218df0f39220fb6fa85d8482d474c 2.2/rpms/ncftp-3.1.9-1tr.i586.rpm
b8419cc291b81e3db050eae2de785e3a 2.2/rpms/php4-4.4.1-2tr.i586.rpm
175e83bc2f202a74293a501e5e55cbfd
2.2/rpms/php4-cli-4.4.1-2tr.i586.rpm
ae60df4cc97315c21ac20952f77c2ea3
2.2/rpms/php4-curl-4.4.1-2tr.i586.rpm
0c38b5f529dd6ab448f6140fdb04d350
2.2/rpms/php4-devel-4.4.1-2tr.i586.rpm
e739af36f8e235ff0b9393b0d46f0bd1
2.2/rpms/php4-domxml-4.4.1-2tr.i586.rpm
1d946e500f1b5b3822c02c0d318861a4
2.2/rpms/php4-exif-4.4.1-2tr.i586.rpm
2ab948befefb4e1be52f48d00cce61a5
2.2/rpms/php4-fcgi-4.4.1-2tr.i586.rpm
f1097595965ae20273cd8920b11a3d49 2.2/rpms/php4-gd-4.4.1-2tr.i586.rpm
9fd0598ea866b18bb540240d1a5e5e7b
2.2/rpms/php4-imap-4.4.1-2tr.i586.rpm
72ec299cf7cbf69ef3ba59d6c1de3608
2.2/rpms/php4-ldap-4.4.1-2tr.i586.rpm
35f76927c35fc4b755b622a5e35b883f
2.2/rpms/php4-mhash-4.4.1-2tr.i586.rpm
6f974e1f102435a59a6ea61b1e07685a
2.2/rpms/php4-mysql-4.4.1-2tr.i586.rpm
4ee7ae9da4753cface5d83830b089c2d
2.2/rpms/php4-pgsql-4.4.1-2tr.i586.rpm
c9dcbcf00d3b873a86e13f8a2a754e29
2.2/rpms/php4-test-4.4.1-2tr.i586.rpm
8eb46324bbf869742367767cb3a51902 2.2/rpms/sudo-1.6.8p9-2tr.i586.rpm
a3977966035a3d8284b8a9f4055aeb82
2.2/rpms/perl-mail-spamassassin-3.0.4-3tr.i586.rpm
1ce0012f486b059a25dfafc2cfe0089a
2.2/rpms/spamassassin-3.0.4-3tr.i586.rpm
11d515339e779c991421dddb80d9efab
2.2/rpms/spamassassin-tools-3.0.4-3tr.i586.rpm
3148ec20cf65bd391acfec0d4005c5f4 2.2/rpms/lynx-2.8.5-4tr.i586.rpm
ORIGINAL ADVISORY:
http://www.trustix.org/errata/2005/0062/
http://www.trustix.org/errata/2005/0064/
http://www.trustix.org/errata/2005/0066/
OTHER REFERENCES:
SA15390:
http://secunia.com/advisories/15390/
SA16971:
http://secunia.com/advisories/16971/
SA17318:
http://secunia.com/advisories/17318/
SA17371:
http://secunia.com/advisories/17371/
SA17372:
http://secunia.com/advisories/17372/
SA17386:
http://secunia.com/advisories/17386/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------