TITLE: Debian update for tutos SECUNIA ADVISORY ID: SA18954 VERIFY ADVISORY: http://secunia.com/advisories/18954/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting, Manipulation of data WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for tutos. This fixes some vulnerabilities, which can be exploited to conduct SQL injection and cross-site scripting attacks. For more information: SA12606 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1.dsc Size/MD5 checksum: 575 7babaefc5a7e57afc2fb421d5829c4cf http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1.tar.gz Size/MD5 checksum: 4955293 c9c539f0d5504d69377e326870db18c3 Architecture independent components: http://security.debian.org/pool/updates/main/t/tutos/tutos_1.1.20031017-2+1sarge1_all.deb Size/MD5 checksum: 4760050 39bb9b2f3e9655c7060f04a5dac83e09 ORIGINAL ADVISORY: http://www.debian.org/security/2006/dsa-980 OTHER REFERENCES: SA12606: http://secunia.com/advisories/12606/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------