---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Debian update for znc SECUNIA ADVISORY ID: SA36091 VERIFY ADVISORY: http://secunia.com/advisories/36091/ DESCRIPTION: Debian has issued an update for znc. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. For more information: SA35916 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3.dsc Size/MD5 checksum: 667 933a585b14d230df9dd1a8b6ee5ad4b6 http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3.diff.gz Size/MD5 checksum: 14501 330d9e4ac7894dbfec53bf9cf1e52660 http://security.debian.org/pool/updates/main/z/znc/znc_0.045.orig.tar.gz Size/MD5 checksum: 204863 9a514b125b7514811fd03befa73cce77 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_alpha.deb Size/MD5 checksum: 863536 a49fb4cba67de68d20b9da2cd8867362 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_amd64.deb Size/MD5 checksum: 794176 ed5f4fe35ce0a2550aa16a423e100065 arm architecture (ARM) http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_arm.deb Size/MD5 checksum: 906432 f49d4961b57febdbc184146bbc0aca2f hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_hppa.deb Size/MD5 checksum: 860972 659a6b3b95f80220b8c55fc54c7c1657 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_i386.deb Size/MD5 checksum: 811820 e2ed63396c2813e5e8a064ab5b4ac646 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_ia64.deb Size/MD5 checksum: 963774 37187a7fb2cc43d51e8112330311334a mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_mips.deb Size/MD5 checksum: 716040 9f206ba9ef54ff3658bbf62c5ec448b5 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_mipsel.deb Size/MD5 checksum: 714202 272cbc77e814fb6ef155e0cd33a1fcbe powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_powerpc.deb Size/MD5 checksum: 793154 84bb601bf6ebf409fbca63545b37c123 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_s390.deb Size/MD5 checksum: 735198 67f86f69500e96461d1cea10fead09a9 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_sparc.deb Size/MD5 checksum: 751090 1a0088824517b4f542e9589febc25536 -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3.dsc Size/MD5 checksum: 1037 93fe1b9b7bd7aeebd7b3e0c3854a477f http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3.diff.gz Size/MD5 checksum: 9628 6fd05e2dbb8e6796dcc647bd79e9d1a0 http://security.debian.org/pool/updates/main/z/znc/znc_0.058.orig.tar.gz Size/MD5 checksum: 340741 c02fd740c55d5b3a7912f7584344103e alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_alpha.deb Size/MD5 checksum: 1096456 18a4159f41d3b931b31f98b84d2fb269 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_amd64.deb Size/MD5 checksum: 1031744 bc265fa88c9bb707b67e757b63ed5853 arm architecture (ARM) http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_arm.deb Size/MD5 checksum: 1152106 dbf436ac4085fa58d3d51c6f9b642c16 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_armel.deb Size/MD5 checksum: 964084 fe6c30329c2deb11d40875b8642d3127 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_hppa.deb Size/MD5 checksum: 1164842 cf1a064e2ece7df88b9d4b9370811d8b i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_i386.deb Size/MD5 checksum: 1010412 654653749e84562db775a6dfd1ca3ebd ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_ia64.deb Size/MD5 checksum: 1183120 31579bc427d4cf4f941b3aea648740d2 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_mips.deb Size/MD5 checksum: 915526 a94198400fd7832802260953d8f10acb mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_mipsel.deb Size/MD5 checksum: 907738 b794ceddef5b50eb6ecad8b16aaff23b powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_powerpc.deb Size/MD5 checksum: 1035914 3176e289856565c20528b779b5dd5b65 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_s390.deb Size/MD5 checksum: 971812 b51b7e7bb2d2b26ac7619a2db5274def sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_sparc.deb Size/MD5 checksum: 1003518 681f3ddd6b61aaae7329b3835d926978 ORIGINAL ADVISORY: http://www.us.debian.org/security/2009/dsa-1848 OTHER REFERENCES: SA35916: http://secunia.com/advisories/35916/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------