----------------------------------------------------------------------

Bist Du interessiert an einem neuen Job in IT-Sicherheit?


Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/

----------------------------------------------------------------------

TITLE:
Debian update for libpam-ldap

SECUNIA ADVISORY ID:
SA16588

VERIFY ADVISORY:
http://secunia.com/advisories/16588/

CRITICAL:
Less critical

IMPACT:
Security Bypass

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
Debian GNU/Linux 3.1
http://secunia.com/product/5307/

DESCRIPTION:
Debian has issued an update for libpam-ldap. This fixes a security
issue, which can be exploited by malicious people to bypass certain
security restrictions.

For more information:
SA16518

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1.dsc
Size/MD5 checksum: 672 d669aa6f0c46e637446594350af42cc8
http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1.diff.gz
Size/MD5 checksum: 19528 2924e1797c39f05e37bafaa761ca2c96
http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178.orig.tar.gz
Size/MD5 checksum: 127074 222186c498d24a7035e8a7494fc0797d

Alpha architecture:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1_alpha.deb
Size/MD5 checksum: 59270 a6960b38195110ce4c555cf89e2cc752

AMD64 architecture:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1_amd64.deb
Size/MD5 checksum: 56984 e14265169b634d5c6ee243cc1b8cc410

ARM architecture:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1_arm.deb
Size/MD5 checksum: 55852 6a4f6cee9779f0bd45511fe4dda02245

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1_i386.deb
Size/MD5 checksum: 57406 eafc9a4a7ee19e173cca4069ce822938

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1_ia64.deb
Size/MD5 checksum: 65072 4de0ae7288d74d2eb7708424603b50f6

HP Precision architecture:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1_hppa.deb
Size/MD5 checksum: 60552 3eb44b515aa7fdd05376520de7ab99dd

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1_m68k.deb
Size/MD5 checksum: 55992 41341e49ab1dd2b2f7c6e1365186579f

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1_mips.deb
Size/MD5 checksum: 56360 3d4ad06491d46a8cbcc80236dd3edd08

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1_mipsel.deb
Size/MD5 checksum: 56292 258c5c9a7b9b725c305c122a6843a4d9

PowerPC architecture:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1_powerpc.deb
Size/MD5 checksum: 57216 933ce656b572a6faaf1273eb2a5bba41

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1_s390.deb
Size/MD5 checksum: 57370 217d4f36380fcecec41236ed53f9a2d6

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/libp/libpam-ldap/libpam-ldap_178-1sarge1_sparc.deb
Size/MD5 checksum: 56934 411656469f51633a23ae7e9961786fca

-- Debian GNU/Linux unstable alias sid --

Fixed in version 178-1sarge1.

ORIGINAL ADVISORY:
http://www.debian.org/security/2005/dsa-785

OTHER REFERENCES:
SA16518:
http://secunia.com/advisories/16518/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------