TITLE: Debian update for zoph SECUNIA ADVISORY ID: SA19153 VERIFY ADVISORY: http://secunia.com/advisories/19153/ CRITICAL: Moderately critical IMPACT: Manipulation of data WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for zoph. This fixes some vulnerabilities, which potentially can be exploited by malicious people to conduct SQL injection attacks. For more information: SA18563 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/z/zoph/zoph_0.3.3-12sarge1.dsc Size/MD5 checksum: 570 ce9957fa5af8115a5aec530aabe6847f http://security.debian.org/pool/updates/main/z/zoph/zoph_0.3.3-12sarge1.diff.gz Size/MD5 checksum: 53959 7c37d28798981a054c634cca92122199 http://security.debian.org/pool/updates/main/z/zoph/zoph_0.3.3.orig.tar.gz Size/MD5 checksum: 153902 5ff9d8e182e16d53e0511b6d51da8521 Architecture independent components: http://security.debian.org/pool/updates/main/z/zoph/zoph_0.3.3-12sarge1_all.deb Size/MD5 checksum: 172190 a185b3cba99ea4bc0f46c73b68bb5a46 -- Debian GNU/Linux unstable alias sid -- Fixed in version 0.5-1. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00067.html OTHER REFERENCES: SA18563: http://secunia.com/advisories/18563/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------