---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for capi4hylafax SECUNIA ADVISORY ID: SA21722 VERIFY ADVISORY: http://secunia.com/advisories/21722/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an advisory for capi4hylafax. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. For more information: SA21722 SOLUTION: -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2.dsc Size/MD5 checksum: 700 ed2b42302da19f397f54be5b6ab2c70d http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2.diff.gz Size/MD5 checksum: 233973 cb882036840592b6365e890ba2bef034 http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03.orig.tar.gz Size/MD5 checksum: 400508 8236290d6b880ee7d5e2fe970648ad6f Alpha architecture: http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_alpha.deb Size/MD5 checksum: 269704 e89fb2126460ebf99fabd817ccc135e1 AMD64 architecture: http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_amd64.deb Size/MD5 checksum: 205810 4fbbb15d7c0b8fa9548f669756b04c36 ARM architecture: http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_arm.deb Size/MD5 checksum: 210290 5c6e249abe28be123f35321175c0caea Intel IA-32 architecture: http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_i386.deb Size/MD5 checksum: 202278 829c7e7f7aa7b51ea52aba913b84f6e9 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_ia64.deb Size/MD5 checksum: 341896 020682a6d4bb63d083a05d961bddaaa8 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_m68k.deb Size/MD5 checksum: 183464 42cddb1cc2295fd753b50a0f49e9a3f4 PowerPC architecture: http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_powerpc.deb Size/MD5 checksum: 213034 6ccc6390878b66462fc4b4c501521025 Sun Sparc architecture: http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_sparc.deb Size/MD5 checksum: 206634 6d82ddf94cd42c355bc125d1d542a1e9 -- Debian GNU/Linux unstable alias sid -- Fixed in version 01.03.00.99.svn.300-3. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1165 OTHER REFERENCES: SA21722: http://secunia.com/advisories/21722 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------