exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 37885

Secunia Security Advisory 37885
Posted Dec 21, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for acpid. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, debian
SHA-256 | 83725f6ea0e0be09e15ddf274659e1af49980c07e6be910e69f6b13c95e9065e

Secunia Security Advisory 37885

Change Mirror Download
----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability
intelligence source on the market.

Implement it through Secunia.

For more information visit:
http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com

----------------------------------------------------------------------

TITLE:
Debian update for acpid

SECUNIA ADVISORY ID:
SA37885

VERIFY ADVISORY:
http://secunia.com/advisories/37885/

DESCRIPTION:
Debian has issued an update for acpid. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.

For more information:
SA37536

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 4.0 alias etch --

Source archives:

http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.4-5etch2.diff.gz
Size/MD5 checksum: 12642 576b3f99b475f0e984714d2dba996206
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.4.orig.tar.gz
Size/MD5 checksum: 23416 3aff94e92186e99ed5fd6dcee2db7c74
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.4-5etch2.dsc
Size/MD5 checksum: 624 3b758a4454f405522ba8ee5b73e3a22b

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.4-5etch2_amd64.deb
Size/MD5 checksum: 27162 b945487fde2ab7450bcd8feb0594838d

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.4-5etch2_i386.deb
Size/MD5 checksum: 25530 8ccef2fa763433abf0f6273e54803254

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.4-5etch2_ia64.deb
Size/MD5 checksum: 33764 1403c833448f94d9cfda9e3d065ad6e3


-- Debian GNU/Linux 5.0 alias lenny --

Source archives:

http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.8-1lenny2.diff.gz
Size/MD5 checksum: 18805 5939243de9ac3c4199ab0b40ecdf4406
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.8-1lenny2.dsc
Size/MD5 checksum: 1290 91e92e7e0e45e556bdf32b46193f3d29
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.8.orig.tar.gz
Size/MD5 checksum: 25308 ee48ff966292ec517ba83b37dd0a3256

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.8-1lenny2_amd64.deb
Size/MD5 checksum: 38026 dc5bf0d06eab4173ff4372d2e4204333

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.8-1lenny2_i386.deb
Size/MD5 checksum: 38026 37ff1d2999cccef9e4e88478be7043f4

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.8-1lenny2_ia64.deb
Size/MD5 checksum: 42950 3c751d888490df8bcf726f2faf7d15c5

ORIGINAL ADVISORY:
DSA-1960-1:
http://www.us.debian.org/security/2009/dsa-1960

OTHER REFERENCES:
SA37536:
http://secunia.com/advisories/37536/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close