Secunia Security Advisory - Debian has issued an update for phpgedview. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks.
6d431ac05bcc21f42e61803e22348282216846eb91806b544f707dbd8fbe6705
----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
2 days left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.
Learn more / Download (instant access):
http://secunia.com/network_software_inspector_2/
----------------------------------------------------------------------
TITLE:
Debian update for phpgedview
SECUNIA ADVISORY ID:
SA29954
VERIFY ADVISORY:
http://secunia.com/advisories/29954/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
OPERATING SYSTEM:
Debian GNU/Linux 4.0
http://secunia.com/product/13844/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
DESCRIPTION:
Debian has issued an update for phpgedview. This fixes some
vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting attacks.
For more information:
SA26922
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 4.0 alias etch --
Source archives:
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg.orig.tar.gz
Size/MD5 checksum: 6181964 73b1f051f01dcd6520a044badaa40fe6
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg-3.diff.gz
Size/MD5 checksum: 7845 0ae3d02bf2f9bfecac01bfbb98e16b53
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg-3.dsc
Size/MD5 checksum: 1053 30d7415d993b4034f44fdfcd9bf9d998
Architecture independent packages:
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview-themes_4.0.2.dfsg-3_all.deb
Size/MD5 checksum: 876616 0745d130e09318bd72790028db6a943d
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview-places_4.0.2.dfsg-3_all.deb
Size/MD5 checksum: 2270996 ce02af3e71b958d0fd3f72c1eea9eca4
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview_4.0.2.dfsg-3_all.deb
Size/MD5 checksum: 1215452 dff7649b79e3f32ee6868839cd3c4c68
http://security.debian.org/pool/updates/main/p/phpgedview/phpgedview-languages_4.0.2.dfsg-3_all.deb
Size/MD5 checksum: 1821112 1b004f9221d532a1e07eb242bdd13ba1
-- Debian GNU/Linux unstable alias sid --
Fixed in version 4.1.e+4.1.1-2.
ORIGINAL ADVISORY:
http://lists.debian.org/debian-security-announce/2008/msg00132.html
OTHER REFERENCES:
SA26922:
http://secunia.com/advisories/26922/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------