what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 23467

Secunia Security Advisory 23467
Posted Dec 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for links2. This fixes some vulnerabilities, which can be exploited by malicious people to expose sensitive information and manipulate data.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | 576543b4a1e897866facb491bd4e70130fdd95b46a796b06e4f2f054fb087b4f

Secunia Security Advisory 23467

Change Mirror Download


----------------------------------------------------------------------

Secunia is proud to announce the availability of the Secunia Software
Inspector.

The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.

Try it out online:
http://secunia.com/software_inspector/

----------------------------------------------------------------------

TITLE:
Debian update for links2

SECUNIA ADVISORY ID:
SA23467

VERIFY ADVISORY:
http://secunia.com/advisories/23467/

CRITICAL:
Moderately critical

IMPACT:
Manipulation of data, Exposure of system information, Exposure of
sensitive information

WHERE:
>From local network

OPERATING SYSTEM:
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/

DESCRIPTION:
Debian has issued an update for links2. This fixes some
vulnerabilities, which can be exploited by malicious people to expose
sensitive information and manipulate data.

For more information:
SA22905

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1.diff.gz
Size/MD5 checksum: 28658 a83c79990bbfb6f9ec26d737f767ee90
http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16.orig.tar.gz
Size/MD5 checksum: 4217483 7baf4fc20cc244d80ead21cebff07d89
http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1.dsc
Size/MD5 checksum: 841 ed4853334b7eebef055271df06cdcd7a

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_alpha.deb
Size/MD5 checksum: 2110324 b3633fddb199c45339d3837bb0a519a0

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_amd64.deb
Size/MD5 checksum: 2040922 5fb402e6a833709741d20238346c7597

arm architecture (ARM)

http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_arm.deb
Size/MD5 checksum: 1996004 c7c79ddcb82d5758668ed71d74b9685f

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_i386.deb
Size/MD5 checksum: 1997426 4c1ef611e31c57583f7471653962a84a

m68k architecture (Motorola Mc680x0)

http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_m68k.deb
Size/MD5 checksum: 1904084 e5c777a07eaa88f4367b51d88c556a14

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_mips.deb
Size/MD5 checksum: 2034596 22854de6eaf3aa1e392291760e85e5e8

-- Debian GNU/Linux unstable alias sid --

Fixed in version 2.1pre26-1.

ORIGINAL ADVISORY:
http://www.us.debian.org/security/2006/dsa-1240

OTHER REFERENCES:
SA22905:
http://secunia.com/advisories/22905/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close