exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 29959

Secunia Security Advisory 29959
Posted Apr 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ldm. This fixes a security issue, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
systems | linux, debian
SHA-256 | 067b47e519870296b45c664f293b26f6f0c4d4ce3d07a35279a77a1cd911d37c

Secunia Security Advisory 29959

Change Mirror Download
----------------------------------------------------------------------

Secunia Network Software Inspector 2.0 (NSI) - Public Beta

1 day left of beta period.

The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.

The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.

Learn more / Download (instant access):
http://secunia.com/network_software_inspector_2/

----------------------------------------------------------------------

TITLE:
Debian update for ldm

SECUNIA ADVISORY ID:
SA29959

VERIFY ADVISORY:
http://secunia.com/advisories/29959/

CRITICAL:
Less critical

IMPACT:
Exposure of system information, Exposure of sensitive information

WHERE:
>From local network

OPERATING SYSTEM:
Debian GNU/Linux 4.0
http://secunia.com/product/13844/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/

DESCRIPTION:
Debian has issued an update for ldm. This fixes a security issue,
which can be exploited by malicious people to disclose sensitive
information.

The security issue is caused due to improper access restrictions
being set when establishing X11 forwarding sessions. This can be
exploited to connect to the X server running on an affected LTSP
client and e.g. grab keyboard input.

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 4.0 alias etch --

Source archives:

http://security.debian.org/pool/updates/main/l/ltsp/ltsp_0.99debian11+etch1.tar.gz
Size/MD5 checksum: 183019 c97fa50f7a30f213742be6466a7817fc
http://security.debian.org/pool/updates/main/l/ltsp/ltsp_0.99debian11+etch1.dsc
Size/MD5 checksum: 1243 c8d0f83f26c580a9fcf5079d303c1958

Architecture independent packages:

http://security.debian.org/pool/updates/main/l/ltsp/ltsp-server-standalone_0.99debian11+etch1_all.deb
Size/MD5 checksum:22346 edf27d69321dc6db44cb252719aad12b
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client-builder_0.99debian11+etch1_all.udeb
Size/MD5 checksum: 2278 bd0856196c64cfcabc1c0f47808b5f4c
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-server_0.99debian11+etch1_all.deb
Size/MD5 checksum:53332 70be96c089a449a543cfb678e55a0f1e
http://security.debian.org/pool/updates/main/l/ltsp/ldm_0.99debian11+etch1_all.deb
Size/MD5 checksum: 116452 51fa6e495db54926e77aa7f62a251dff

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_alpha.deb
Size/MD5 checksum:50686 145f4579f02af33e644674b0a2ecff67

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_amd64.deb
Size/MD5 checksum:50638 9ea8d9f916b011a9f5379ed31f8a7cc7

arm architecture (ARM)

http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_arm.deb
Size/MD5 checksum:49608 8c1b8f8908b2099c8f97946144dd7ca0

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_hppa.deb
Size/MD5 checksum:50448 08ca2c9cdc6bc5a274bb7114495e0e7d

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_i386.deb
Size/MD5 checksum:49302 b20a0740d53c1c6aeffdab69b2bb14bf

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_ia64.deb
Size/MD5 checksum:55934 b614ff92f4cb3dcea9329ea219f77a60

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_mips.deb
Size/MD5 checksum:50166 298ad47e264bf2b3e3b69fd52f772df1

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_mipsel.deb
Size/MD5 checksum:50914 770ee6fa07216c0a2a0da7922d820ea7

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_powerpc.deb
Size/MD5 checksum:50602 3b30a76ae56aedbfdc67c2bd975eefd6

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_s390.deb
Size/MD5 checksum:51558 9c2f6986508538205f6e5d937a9bc8d7

-- Debian GNU/Linux unstable alias sid --

Fixed in version 2:0.1~bzr20080308-1.

PROVIDED AND/OR DISCOVERED BY:
Reported by Christian Herzog in a Debian bug report.

ORIGINAL ADVISORY:
http://www.us.debian.org/security/2008/dsa-1561
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close