TITLE:
Debian update for libapache2-mod-auth-pgsql

SECUNIA ADVISORY ID:
SA18397

VERIFY ADVISORY:
http://secunia.com/advisories/18397/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/

DESCRIPTION:
Debian has issued an update for libapache2-mod-auth-pgsql. This fixes
a vulnerability, which can be exploited by malicious people to
compromise a vulnerable system.

For more information:
SA18304

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0.dsc
Size/MD5 checksum: 718 64320b302321622c1007810e18f6559a
http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0.diff.gz
Size/MD5 checksum: 5031 400a8ca9689409375c56eafe38a957a7
http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1.orig.tar.gz
Size/MD5 checksum: 15928 e2c032df0cd7e4a46381dcf6e488efe9

Alpha architecture:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_alpha.deb
Size/MD5 checksum: 20410 4e2c27c73a6ca3ca70713e31842c01ca

AMD64 architecture:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_amd64.deb
Size/MD5 checksum: 20040 9b542446b7336c88c2ffabdad730b74f

ARM architecture:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_arm.deb
Size/MD5 checksum: 18806 fcf3a9529b0b2af5a67237360c60f554

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_i386.deb
Size/MD5 checksum: 19406 f869e108de0839dcdcc2ee9459a8848d

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_ia64.deb
Size/MD5 checksum: 22282 018e612149c4d4a2cb139ee91b972cae

HP Precision architecture:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_hppa.deb
Size/MD5 checksum: 20686 dc84765b12cb57c7c2b68d9f875d8f07

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_m68k.deb
Size/MD5 checksum: 18944 ab3c2f517273d868d8dd3fcf9b78ea0a

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_mips.deb
Size/MD5 checksum: 18884 cfed58fc3dd4bc0e7b635f048b9ef317

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_mipsel.deb
Size/MD5 checksum: 18860 dc5b1b912b0fcf62d2a8edc7a5a9fa52

PowerPC architecture:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_powerpc.deb
Size/MD5 checksum: 20710 bdc297d45748433b2adcd3ac962612a3

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_s390.deb
Size/MD5 checksum: 19840 798db337084461ee60239274cf89f4e0

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/liba/libapache2-mod-auth-pgsql/libapache2-mod-auth-pgsql_2.0.2b1-5sarge0_sparc.deb
Size/MD5 checksum: 19006 6cd6c8809599feec59df63281adcfd7b

-- Debian GNU/Linux unstable alias sid --

The vulnerability will reportedly be fixed shortly.

ORIGINAL ADVISORY:
http://www.debian.org/security/2006/dsa-935

OTHER REFERENCES:
SA18304:
http://secunia.com/advisories/18304/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------