exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 17882

Secunia Security Advisory 17882
Posted Dec 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for inkscape. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and by malicious people to potentially compromise a user's system.

tags | advisory, local, vulnerability
systems | linux, debian
SHA-256 | 65f80647cfd70a63d004095da6e4e6d4193bc6f01b00642ea453d531a5ef9720

Secunia Security Advisory 17882

Change Mirror Download


TITLE:
Debian update for inkscape

SECUNIA ADVISORY ID:
SA17882

VERIFY ADVISORY:
http://secunia.com/advisories/17882/

CRITICAL:
Moderately critical

IMPACT:
Privilege escalation, DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/

DESCRIPTION:
Debian has issued an update for inkscape. This fixes two
vulnerabilities, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges and by malicious people to potentially compromise a user's
system.

For more information:
SA16343
SA17651

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2.dsc
Size/MD5 checksum: 889 8e20fa91e0d4cc48dad356842e279d43
http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2.diff.gz
Size/MD5 checksum: 19542 16dc49a90ef6362eafb0f1185d1d3341
http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41.orig.tar.gz
Size/MD5 checksum: 6090081 989a09d06e4db1ddfd00b8019a5dcd73

Alpha architecture:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_alpha.deb
Size/MD5 checksum: 5976090 cd204ed15f1c5ab0603225d6b98c5b39

AMD64 architecture:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_amd64.deb
Size/MD5 checksum: 5424440 2cab0898d7275fedb719e98ff1de05ea

ARM architecture:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_arm.deb
Size/MD5 checksum: 5413996 5b4fd5a1d97408108cc26e0990468d63

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_i386.deb
Size/MD5 checksum: 5445836 435ce53091c87aeb6979d3b7c75a625e

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_ia64.deb
Size/MD5 checksum: 6580176 f855d6c9aca23aa045e4d0e391cd3e65

HP Precision architecture:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_hppa.deb
Size/MD5 checksum: 5894380 f233719364af393e84eb3577c5bd3d90

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_m68k.deb
Size/MD5 checksum: 5326010 d5a122f8852512d0eef1202fad73d970

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_mips.deb
Size/MD5 checksum: 5768826 56ea6b35e2340861c4440aa650f2bd62

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_mipsel.deb
Size/MD5 checksum: 5760476 3f2dc329f2cc5d1597c931a234900931

PowerPC architecture:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_powerpc.deb
Size/MD5 checksum: 5573546 4310413071b8b30686aefb533c36c09a

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_s390.deb
Size/MD5 checksum: 5280106 f892057ad430c49c47ad408ed8455c8a

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/i/inkscape/inkscape_0.41-4.99.sarge2_sparc.deb
Size/MD5 checksum: 5350968 1654ffcb98846190a686440f43e691bd

-- Debian GNU/Linux unstable alias sid --

Fixed in version 0.42.2+0.43pre1-1.

ORIGINAL ADVISORY:
http://www.debian.org/security/2005/dsa-916

OTHER REFERENCES:
SA16343:
http://secunia.com/advisories/16343/

SA17651:
http://secunia.com/advisories/17651/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close