exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 30280

Secunia Security Advisory 30280
Posted May 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for netpbm-free. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
SHA-256 | a0f9de3410f001967469a68eabdd5edb175f8d616fbce4fc1c2add1f5aaec2a2

Secunia Security Advisory 30280

Change Mirror Download
----------------------------------------------------------------------

Secunia Network Software Inspector 2.0 (NSI) - Public Beta

The Public Beta has ended. Thanks to all that participated.

Learn more:
http://secunia.com/network_software_inspector_2/

----------------------------------------------------------------------

TITLE:
Debian update for netpbm-free

SECUNIA ADVISORY ID:
SA30280

VERIFY ADVISORY:
http://secunia.com/advisories/30280/

CRITICAL:
Moderately critical

IMPACT:
DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
Debian GNU/Linux 4.0
http://secunia.com/product/13844/

DESCRIPTION:
Debian has issued an update for netpbm-free. This fixes a
vulnerability, which can potentially be exploited by malicious people
to compromise a vulnerable system.

For more information see vulnerability #2 in:
SA20729

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 4.0 alias etch --

Source archives:

http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm-free_10.0-11.1+etch1.diff.gz
Size/MD5 checksum:49833 5e340881bb56e88ca2525c5baf3a12cf
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm-free_10.0.orig.tar.gz
Size/MD5 checksum:1926538 985e9f6d531ac0b2004f5cbebdeea87d
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm-free_10.0-11.1+etch1.dsc
Size/MD5 checksum:755 e8b82a4cab1e4352faf53d6093ff02d1

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_alpha.deb
Size/MD5 checksum:84206 b33236e6b1bfd895231905579583ec1c
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_alpha.deb
Size/MD5 checksum: 139256 4dde0418859c0a44e8abbd5a8888bc97
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_alpha.deb
Size/MD5 checksum:75730 5ba8dac319fcb09e6057edcf339031da
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_alpha.deb
Size/MD5 checksum:1423650 928d158de222f0aad537d2e9d5a55d1c
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_alpha.deb
Size/MD5 checksum: 138864 d72de0e9205fafc74ed5a61574f90a89

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_amd64.deb
Size/MD5 checksum:75412 c87cf158e0234259584f584a9f1832b5
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_amd64.deb
Size/MD5 checksum:1241558 470cca7fe0cafa9a3ef519e45911989f
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_amd64.deb
Size/MD5 checksum: 116838 1444d40f6022a1650c8ebcf5041ba6ef
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_amd64.deb
Size/MD5 checksum:67404 c11ac33a59b828227df65f030d4b0ecd
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_amd64.deb
Size/MD5 checksum: 117288 aa57bddc977bfcaae40c4d2e0dfab247

arm architecture (ARM)

http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_arm.deb
Size/MD5 checksum:62288 4f73d9da53ef5fca46b720787b69a937
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_arm.deb
Size/MD5 checksum:1260142 3aad360491069ca71cb1fd79a54047b3
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_arm.deb
Size/MD5 checksum: 109834 a9b24a209be2c2a05183d5a501981669
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_arm.deb
Size/MD5 checksum:68692 02d48f5f058f67b7d2007332c214211d
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_arm.deb
Size/MD5 checksum: 110104 7e35448f17f029ad74902589aae0c0c5

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_hppa.deb
Size/MD5 checksum:1333920 a56ad3bc6edba6f0c8aeeb90a05b24ae
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_hppa.deb
Size/MD5 checksum:82594 68fa87cdf4869bc89047fe0ad48cb1cf
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_hppa.deb
Size/MD5 checksum: 125684 7df0ea27cbd816e3c4846bd4714907c4
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_hppa.deb
Size/MD5 checksum: 125788 49bdc7c577ccfee26adfd44187e7098d
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_hppa.deb
Size/MD5 checksum:73896 5cd54f6760f1d0a74899aa5b1eeeefee

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_i386.deb
Size/MD5 checksum:63758 f905f22588b614831324060426e5751d
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_i386.deb
Size/MD5 checksum:1181300 365c86b4233a807c3c6c10f800da4afa
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_i386.deb
Size/MD5 checksum:70202 591a522cb5cc225858e8ef59c0b0229e
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_i386.deb
Size/MD5 checksum: 109860 c1011f89b554328ff82cd01451e667c1
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_i386.deb
Size/MD5 checksum: 109718 c1130da9304e855827b99d4c2202a5b2

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_ia64.deb
Size/MD5 checksum: 101310 e695256a27385dee8fb2f8ddf1ccb151
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_ia64.deb
Size/MD5 checksum:92042 a2df3ed51d279ad0191401d7db0a29de
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_ia64.deb
Size/MD5 checksum:1759566 1f58b0302e2394d09bf3fcc423ee77ec
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_ia64.deb
Size/MD5 checksum: 149610 8458ab3ca7477d7011b815e31651a74a
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_ia64.deb
Size/MD5 checksum: 149986 dc3f0e6f5e4511c5970a0bcd726d8f3b

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_mips.deb
Size/MD5 checksum: 124128 fad3edf3cf23f0bf7d13660bbb02795e
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_mips.deb
Size/MD5 checksum: 123212 5331c9d21f4e49029a2d6afc8e88fbcd
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_mips.deb
Size/MD5 checksum:73522 ff8075e6113bf9f387798a142c8d07a8
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_mips.deb
Size/MD5 checksum:1318050 688e833af5f7ed3dcaf6c8b803acab6b
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_mips.deb
Size/MD5 checksum:65826 f6f9b8c34d1fc3ecb332baf87144cc67

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_mipsel.deb
Size/MD5 checksum: 123410 7e7c4c3649a11e6c5d2bac60511a2608
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_mipsel.deb
Size/MD5 checksum:65710 dff78e7f50f68e0e942323af94c69af5
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_mipsel.deb
Size/MD5 checksum:1297700 ed5a3f2a53460072beae27697d68bb31
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_mipsel.deb
Size/MD5 checksum:72604 b5a39f3389ede6a53b330e761db9d0e8
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_mipsel.deb
Size/MD5 checksum: 123830 2593cde97437a5d9c33ac978a948bbeb

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_powerpc.deb
Size/MD5 checksum: 119758 e917d3ac53867792653b8a7d2d090824
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_powerpc.deb
Size/MD5 checksum:79014 ee2fd0a785658b116b877f951b8e1531
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_powerpc.deb
Size/MD5 checksum:1448810 c24163baecf73aa5452954e1f4c04b05
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_powerpc.deb
Size/MD5 checksum: 119366 26fc1ef0d6d24cc8c0ea956b9cc12f9c
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_powerpc.deb
Size/MD5 checksum:68122 8ef7a20dc73a9e293cf5b15bf33ead0d

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_s390.deb
Size/MD5 checksum:1245934 825184a22f4476b277cade23ec93cbf5
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_s390.deb
Size/MD5 checksum:76472 005fc9caafb6eb047701e3f5272d0bbe
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_s390.deb
Size/MD5 checksum: 114788 ba4a56d368c612f161f3e0c983e98bd6
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_s390.deb
Size/MD5 checksum: 115006 4c1b4a388455a0725771dfb5c73f8ddc
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_s390.deb
Size/MD5 checksum:69900 bf8bf3369a29c340eb035413034cccae

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_sparc.deb
Size/MD5 checksum: 111782 e2553ed79f836d8fa1dc25422ba8aa95
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_sparc.deb
Size/MD5 checksum:68808 4ee6c9653cd560ec0074275b457202b7
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_sparc.deb
Size/MD5 checksum: 111562 e126024c8567d3140c240e60ecc390dc
http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_sparc.deb
Size/MD5 checksum:1204234 85d633a743c51efea0122caa7e12c6ea
http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_sparc.deb
Size/MD5 checksum:62992 efe34ea795e4c875ab65c28f413a590f

-- Debian GNU/Linux unstable alias sid --

Fixed in version 2:10.0-11.1.

ORIGINAL ADVISORY:
http://www.debian.org/security/2008/dsa-1579

OTHER REFERENCES:
SA20729:
http://secunia.com/advisories/20729/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close