---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Debian update for pdfkit.framework SECUNIA ADVISORY ID: SA26365 VERIFY ADVISORY: http://secunia.com/advisories/26365/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for pdfkit.framework. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to the use of vulnerable Xpdf code, which may allow the execution of arbitrary code. For more information: SA26188 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4.dsc Size/MD5 checksum: 725 bfe8bf57eeadaeeaa5ba33a458a8e185 http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4.diff.gz Size/MD5 checksum: 7077 a9e6dc46fa95a2763e865999b3789e50 http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8.orig.tar.gz Size/MD5 checksum: 1780533 7676643ff78a0602c10bfb97fe0bd448 Alpha architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4_alpha.deb Size/MD5 checksum: 1822590 0f097258e91f1d7eabf3384ecb10b3e8 AMD64 architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4_amd64.deb Size/MD5 checksum: 1797204 534d18691bdd0729af9e854311408460 HP Precision architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4_hppa.deb Size/MD5 checksum: 1863092 764d3796d34c879af9a5594c4f50e5e9 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4_i386.deb Size/MD5 checksum: 1750926 fd435c2d7270d324c74aa054c7230e96 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4_ia64.deb Size/MD5 checksum: 1981838 c7a18c58ea887fb5b0f2194659ccdd77 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4_m68k.deb Size/MD5 checksum: 1786348 3b4885f47d0d55dad0e70aa20e42c73d Big endian MIPS architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4_mips.deb Size/MD5 checksum: 1769560 9f0071e086fa239f2068d426f9dddae9 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4_mipsel.deb Size/MD5 checksum: 1755228 cda830fc73806bc80e1104359fea752a PowerPC architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4_powerpc.deb Size/MD5 checksum: 1771430 1d2fb8df07e688855b1c716123c2213d IBM S/390 architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4_s390.deb Size/MD5 checksum: 1805290 78cfaa378a73eae337978d3df379be99 Sun Sparc architecture: http://security.debian.org/pool/updates/main/p/pdfkit.framework/pdfkit.framework_0.8-2sarge4_sparc.deb Size/MD5 checksum: 1780538 cb9824fd6a64b10257f79d0df7c1a474 ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00114.html OTHER REFERENCES: SA26188: http://secunia.com/advisories/26188/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------