exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 17666

Secunia Security Advisory 17666
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Trustix has issued updates for multiple packages. These fix some vulnerabilities, where the most critical ones can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a user's system or vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 01599546892c21399f97f0e095f4db3d612ad2fcebd77001ac2e3ae0007519a9

Secunia Security Advisory 17666

Change Mirror Download


TITLE:
Trustix update for multiple packages

SECUNIA ADVISORY ID:
SA17666

VERIFY ADVISORY:
http://secunia.com/advisories/17666/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, Cross Site Scripting, Privilege escalation, DoS,
System access

WHERE:
>From remote

OPERATING SYSTEM:
Trustix Secure Linux 2.2
http://secunia.com/product/4641/

DESCRIPTION:
Trustix has issued updates for multiple packages. These fix some
vulnerabilities, where the most critical ones can be exploited by
malicious people to bypass certain security restrictions, cause a DoS
(Denial of Service), and compromise a user's system or vulnerable
system.

For more information:
SA15390
SA16971
SA17318
SA17371
SA17372
SA17386

SOLUTION:
Apply updated packages.

Trustix Secure Linux 2.2:
24f218df0f39220fb6fa85d8482d474c 2.2/rpms/ncftp-3.1.9-1tr.i586.rpm
b8419cc291b81e3db050eae2de785e3a 2.2/rpms/php4-4.4.1-2tr.i586.rpm
175e83bc2f202a74293a501e5e55cbfd
2.2/rpms/php4-cli-4.4.1-2tr.i586.rpm
ae60df4cc97315c21ac20952f77c2ea3
2.2/rpms/php4-curl-4.4.1-2tr.i586.rpm
0c38b5f529dd6ab448f6140fdb04d350
2.2/rpms/php4-devel-4.4.1-2tr.i586.rpm
e739af36f8e235ff0b9393b0d46f0bd1
2.2/rpms/php4-domxml-4.4.1-2tr.i586.rpm
1d946e500f1b5b3822c02c0d318861a4
2.2/rpms/php4-exif-4.4.1-2tr.i586.rpm
2ab948befefb4e1be52f48d00cce61a5
2.2/rpms/php4-fcgi-4.4.1-2tr.i586.rpm
f1097595965ae20273cd8920b11a3d49 2.2/rpms/php4-gd-4.4.1-2tr.i586.rpm
9fd0598ea866b18bb540240d1a5e5e7b
2.2/rpms/php4-imap-4.4.1-2tr.i586.rpm
72ec299cf7cbf69ef3ba59d6c1de3608
2.2/rpms/php4-ldap-4.4.1-2tr.i586.rpm
35f76927c35fc4b755b622a5e35b883f
2.2/rpms/php4-mhash-4.4.1-2tr.i586.rpm
6f974e1f102435a59a6ea61b1e07685a
2.2/rpms/php4-mysql-4.4.1-2tr.i586.rpm
4ee7ae9da4753cface5d83830b089c2d
2.2/rpms/php4-pgsql-4.4.1-2tr.i586.rpm
c9dcbcf00d3b873a86e13f8a2a754e29
2.2/rpms/php4-test-4.4.1-2tr.i586.rpm
8eb46324bbf869742367767cb3a51902 2.2/rpms/sudo-1.6.8p9-2tr.i586.rpm
a3977966035a3d8284b8a9f4055aeb82
2.2/rpms/perl-mail-spamassassin-3.0.4-3tr.i586.rpm
1ce0012f486b059a25dfafc2cfe0089a
2.2/rpms/spamassassin-3.0.4-3tr.i586.rpm
11d515339e779c991421dddb80d9efab
2.2/rpms/spamassassin-tools-3.0.4-3tr.i586.rpm
3148ec20cf65bd391acfec0d4005c5f4 2.2/rpms/lynx-2.8.5-4tr.i586.rpm

ORIGINAL ADVISORY:
http://www.trustix.org/errata/2005/0062/
http://www.trustix.org/errata/2005/0064/
http://www.trustix.org/errata/2005/0066/

OTHER REFERENCES:
SA15390:
http://secunia.com/advisories/15390/

SA16971:
http://secunia.com/advisories/16971/

SA17318:
http://secunia.com/advisories/17318/

SA17371:
http://secunia.com/advisories/17371/

SA17372:
http://secunia.com/advisories/17372/

SA17386:
http://secunia.com/advisories/17386/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close