---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for openssl096 SECUNIA ADVISORY ID: SA22500 VERIFY ADVISORY: http://secunia.com/advisories/22500/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for openssl096. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. For more information: SA22130 SOLUTION: Apply updated packages. Source archives: http://security.debian.org/pool/updates/main/o/openssl096/openssl096_0.9.6m-1sarge4.diff.gz Size/MD5 checksum: 21115 9019caf796eb866f24d5949503b1cdb5 http://security.debian.org/pool/updates/main/o/openssl096/openssl096_0.9.6m.orig.tar.gz Size/MD5 checksum: 2184918 1b63bfdca1c37837dddde9f1623498f9 http://security.debian.org/pool/updates/main/o/openssl096/openssl096_0.9.6m-1sarge4.dsc Size/MD5 checksum: 617 7d60c6c3ecdf502734068ab2a8b32118 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge4_alpha.deb Size/MD5 checksum: 1966534 9f78dcc0f9685641a7fc3d927370d819 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge4_amd64.deb Size/MD5 checksum: 578632 f1574a0058e85cb0e2c6cff996530c97 arm architecture (ARM) http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge4_arm.deb Size/MD5 checksum: 519304 66fa4a65d803f0115dd80d5359944a2d hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge4_hppa.deb Size/MD5 checksum: 587946 353d46f3351d5a19dfdaf22f605fc627 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge4_i386.deb Size/MD5 checksum: 1756270 2747688d91dfe1cd00430a74bdef6265 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge4_ia64.deb Size/MD5 checksum: 815662 45a5b6503ed631149fea28b37a980e21 m68k architecture (Motorola Mc680x0) http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge4_m68k.deb Size/MD5 checksum: 477288 da4ddff773fd7d6af0604363719b368a mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge4_mips.deb Size/MD5 checksum: 577284 d2bf3c9d86dbba15bbb9d1cb93a6fc51 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge4_mipsel.deb Size/MD5 checksum: 569246 75d69f033f833b7928a8ca521efb95ea powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge4_powerpc.deb Size/MD5 checksum: 582928 72be71aae8b781ca5a7b1d1b2e738541 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge4_s390.deb Size/MD5 checksum: 602874 e671b41d37d34b7d2055eaca112be269 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge4_sparc.deb Size/MD5 checksum: 1460162 acfb3e17f005c32268fa1def17ea884b ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1195 OTHER REFERENCES: SA22130: http://secunia.com/advisories/22130/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------