---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for rssh SECUNIA ADVISORY ID: SA21087 VERIFY ADVISORY: http://secunia.com/advisories/21087/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for rssh. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. For more information: SA18224 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 -- Source archives: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2.dsc Size/MD5 checksum: 589 a8ccbaa1d14d0aa30b3eb0bb1aefd4e5 http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2.diff.gz Size/MD5 checksum: 52207 00e3ad8c7944ed55e1316e414ab3d388 http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3.orig.tar.gz Size/MD5 checksum: 107216 74f40a4fd5d2b097af34a817e21a33cf Alpha architecture: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2_alpha.deb Size/MD5 checksum: 48782 0388514b947030f42219c9a615527dd9 AMD64 architecture: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2_amd64.deb Size/MD5 checksum: 44472 021a58e5c2591e2a15e4f1804816aa7b ARM architecture: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2_arm.deb Size/MD5 checksum: 41974 98eb40b5011e7868b02edfc07591f005 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2_i386.deb Size/MD5 checksum: 42596 7236c31d25f8b4cbbb8894112aa585aa Intel IA-64 architecture: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2_ia64.deb Size/MD5 checksum: 55530 9c61a904a78c4c6d93763cdb73f9c009 HP Precision architecture: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2_hppa.deb Size/MD5 checksum: 44098 334ae1019286051be323bf6994d51c99 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2_m68k.deb Size/MD5 checksum: 41522 0efafd5a441d6d392d1a2490bfb2dcc4 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2_mips.deb Size/MD5 checksum: 49520 7126170731d1b5ad12d7afb6d68c16b7 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2_mipsel.deb Size/MD5 checksum: 49546 7d8859c87eeb09f3b2502cfbed3c3f66 PowerPC architecture: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2_powerpc.deb Size/MD5 checksum: 42936 f68184985e1ec6c27518ac74404afbec IBM S/390 architecture: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2_s390.deb Size/MD5 checksum: 42596 29243bae45e1dca2c07ca609617c0bfa Sun Sparc architecture: http://security.debian.org/pool/updates/main/r/rssh/rssh_2.2.3-1.sarge.2_sparc.deb Size/MD5 checksum: 42532 59db16aa282bc182f79418fdd99341c0 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.3.0-1.1. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1109 OTHER REFERENCES: SA18224: http://secunia.com/advisories/18224/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------