---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta 1 day left of beta period. The 1st generation of the Secunia Network Software Inspector (NSI) has been available for corporate users for almost 1 year and its been a tremendous success. The 2nd generation Secunia NSI is built on the same technology as the award winning Secunia PSI, which has already been downloaded and installed on more than 400,000 computers world wide. Learn more / Download (instant access): http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: Debian update for ldm SECUNIA ADVISORY ID: SA29959 VERIFY ADVISORY: http://secunia.com/advisories/29959/ CRITICAL: Less critical IMPACT: Exposure of system information, Exposure of sensitive information WHERE: >From local network OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for ldm. This fixes a security issue, which can be exploited by malicious people to disclose sensitive information. The security issue is caused due to improper access restrictions being set when establishing X11 forwarding sessions. This can be exploited to connect to the X server running on an affected LTSP client and e.g. grab keyboard input. SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/l/ltsp/ltsp_0.99debian11+etch1.tar.gz Size/MD5 checksum: 183019 c97fa50f7a30f213742be6466a7817fc http://security.debian.org/pool/updates/main/l/ltsp/ltsp_0.99debian11+etch1.dsc Size/MD5 checksum: 1243 c8d0f83f26c580a9fcf5079d303c1958 Architecture independent packages: http://security.debian.org/pool/updates/main/l/ltsp/ltsp-server-standalone_0.99debian11+etch1_all.deb Size/MD5 checksum:22346 edf27d69321dc6db44cb252719aad12b http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client-builder_0.99debian11+etch1_all.udeb Size/MD5 checksum: 2278 bd0856196c64cfcabc1c0f47808b5f4c http://security.debian.org/pool/updates/main/l/ltsp/ltsp-server_0.99debian11+etch1_all.deb Size/MD5 checksum:53332 70be96c089a449a543cfb678e55a0f1e http://security.debian.org/pool/updates/main/l/ltsp/ldm_0.99debian11+etch1_all.deb Size/MD5 checksum: 116452 51fa6e495db54926e77aa7f62a251dff alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_alpha.deb Size/MD5 checksum:50686 145f4579f02af33e644674b0a2ecff67 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_amd64.deb Size/MD5 checksum:50638 9ea8d9f916b011a9f5379ed31f8a7cc7 arm architecture (ARM) http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_arm.deb Size/MD5 checksum:49608 8c1b8f8908b2099c8f97946144dd7ca0 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_hppa.deb Size/MD5 checksum:50448 08ca2c9cdc6bc5a274bb7114495e0e7d i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_i386.deb Size/MD5 checksum:49302 b20a0740d53c1c6aeffdab69b2bb14bf ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_ia64.deb Size/MD5 checksum:55934 b614ff92f4cb3dcea9329ea219f77a60 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_mips.deb Size/MD5 checksum:50166 298ad47e264bf2b3e3b69fd52f772df1 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_mipsel.deb Size/MD5 checksum:50914 770ee6fa07216c0a2a0da7922d820ea7 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_powerpc.deb Size/MD5 checksum:50602 3b30a76ae56aedbfdc67c2bd975eefd6 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_s390.deb Size/MD5 checksum:51558 9c2f6986508538205f6e5d937a9bc8d7 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2:0.1~bzr20080308-1. PROVIDED AND/OR DISCOVERED BY: Reported by Christian Herzog in a Debian bug report. ORIGINAL ADVISORY: http://www.us.debian.org/security/2008/dsa-1561 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------