what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 18623

Secunia Security Advisory 18623
Posted Jan 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for lsh-utils. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information or to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, debian
SHA-256 | 7c9e099f2e69de24dab48264e635114635d99acd903cc633751bb3214abbab01

Secunia Security Advisory 18623

Change Mirror Download


TITLE:
Debian update for lsh-utils

SECUNIA ADVISORY ID:
SA18623

VERIFY ADVISORY:
http://secunia.com/advisories/18623/

CRITICAL:
Less critical

IMPACT:
Exposure of sensitive information, DoS

WHERE:
Local system

OPERATING SYSTEM:
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/

DESCRIPTION:
Debian has issued an update for lsh-utils. This fixes a
vulnerability, which can be exploited by malicious, local users to
gain knowledge of potentially sensitive information or to cause a DoS
(Denial of Service).

For more information:
SA18564

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1.dsc
Size/MD5 checksum: 827 27a08dea0eb4d51595d12325dd2dc9b9
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1.diff.gz
Size/MD5 checksum: 65643 ce143cd95c98d22be17702cfa7d00883
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1.orig.tar.gz
Size/MD5 checksum: 1866063 25ca0b4385779de3d58d2d5757f495c3

Architecture independent components:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils-doc_2.0.1-3sarge1_all.deb
Size/MD5 checksum: 167108 8a72fcaeee3a9e87bb2f596790e0ed0d

Alpha architecture:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_alpha.deb
Size/MD5 checksum: 401168 b3c017e4498e57576f75c8c6a4141bd1
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_alpha.deb
Size/MD5 checksum: 338576 573bddb6eaf7a2488199c4559aae3c29
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_alpha.deb
Size/MD5 checksum: 1024694 db2d07041589921cea746b35970448c9

ARM architecture:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_arm.deb
Size/MD5 checksum: 295730 dbbf6d2c5a9a78d8757536c0a91c12b1
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_arm.deb
Size/MD5 checksum: 263990 524f432ff03e1e4e0de80868b5251dc1
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_arm.deb
Size/MD5 checksum: 751640 662e1c293a3ad6ee830e0c154899a5e3

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_i386.deb
Size/MD5 checksum: 300088 5038534a8bf05c1afe3b6a02d949d19e
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_i386.deb
Size/MD5 checksum: 265836 6236889e8e52a65e3302a9cde882b46d
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_i386.deb
Size/MD5 checksum: 746754 a8608dc7abfb61b37b49985d6914939d

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_ia64.deb
Size/MD5 checksum: 447126 6e6ea9ed0b40b44f6a77de4bff109d15
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_ia64.deb
Size/MD5 checksum: 374070 9c7aea3671804cbd9e67c621aa08ae11
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_ia64.deb
Size/MD5 checksum: 1164462 e73a3d57a099a72d436f071d8666c41f

HP Precision architecture:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_hppa.deb
Size/MD5 checksum: 343638 de455b0e097e6702ada6deaaf8803898
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_hppa.deb
Size/MD5 checksum: 295558 225a99b05fafbe38ecba5ed54ae56997
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_hppa.deb
Size/MD5 checksum: 868638 79878de6808ade34d2551aae99f9cd7b

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_m68k.deb
Size/MD5 checksum: 272632 01605d69846557dfc5b2d3f802eeb9c2
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_m68k.deb
Size/MD5 checksum: 244748 ae046120b9001ef2109b83ae014e7206
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_m68k.deb
Size/MD5 checksum: 669880 1ba0c5ea28762faaaffebf763666c7b9

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_mips.deb
Size/MD5 checksum: 352524 b760940edecb51c6f138f92ed79e1027
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_mips.deb
Size/MD5 checksum: 305572 42622131e45e23460a40a168b22f2cdf
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_mips.deb
Size/MD5 checksum: 886516 0a3a7d73e941ccb3d042a17ed91757e2

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_mipsel.deb
Size/MD5 checksum: 353328 3aae28d22cd30aa12f9cc1edcc3f1800
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_mipsel.deb
Size/MD5 checksum: 306144 3d47e49fa2507587cb1d92992e593081
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_mipsel.deb
Size/MD5 checksum: 888880 0afea7b20d9dc5c12ca7cce15c74643f

PowerPC architecture:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_powerpc.deb
Size/MD5 checksum: 316982 d6bbece27b282748d90d5938a8111f21
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_powerpc.deb
Size/MD5 checksum: 282628 9c7a4830a74bc90a5832e6160e1e082d
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_powerpc.deb
Size/MD5 checksum: 809622 31709a65f368f7a068dcbdce4e1aff06

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_s390.deb
Size/MD5 checksum: 343902 6f3d3524ce342b6a2497940d4bc4bb40
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_s390.deb
Size/MD5 checksum: 297426 50e9c6e52e3c32c6a8597d2a0475b0d4
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_s390.deb
Size/MD5 checksum: 883990 8683782431b1e5e418265972c8877f81

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_2.0.1-3sarge1_sparc.deb
Size/MD5 checksum: 292410 44c4c08694ffc59077c2f1fc1112d33f
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_2.0.1-3sarge1_sparc.deb
Size/MD5 checksum: 262056 05063d13ff9e2b43a4e27e915507d932
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_2.0.1-3sarge1_sparc.deb
Size/MD5 checksum: 751050 a2f59d44ed6b8c7759a240f491416b63

-- Debian GNU/Linux unstable alias sid --

Fixed in version 2.0.1cdbs-4.

ORIGINAL ADVISORY:
http://www.debian.org/security/2006/dsa-956

OTHER REFERENCES:
SA18564:
http://secunia.com/advisories/18564/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close