---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Debian update for elinks SECUNIA ADVISORY ID: SA23234 VERIFY ADVISORY: http://secunia.com/advisories/23234/ CRITICAL: Moderately critical IMPACT: Manipulation of data, Exposure of system information, Exposure of sensitive information WHERE: >From local network OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for elinks. This fixes a vulnerability, which can be exploited by malicious people to expose sensitive information and manipulate data. For more information: SA22920 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1.dsc Size/MD5 checksum: 855 f57923819fa4fce0caca333fb49a08cb http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1.diff.gz Size/MD5 checksum: 25157 611bbe8d6abbdec32944915213b3ffea http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4.orig.tar.gz Size/MD5 checksum: 3533243 d97d1755f9553a3f5c68a3fe420c6a7c Alpha architecture: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_alpha.deb Size/MD5 checksum: 1439074 2db129d65122955bd31c6a62700f0843 http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_alpha.deb Size/MD5 checksum: 764102 0654e01c0d5ee49ddb8d24e01d4bd220 AMD64 architecture: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_amd64.deb Size/MD5 checksum: 1364322 aa61b139f250715d1e9cb1725bfa7938 http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_amd64.deb Size/MD5 checksum: 706090 18b9ebad31887943c0f54aebd0b355d6 ARM architecture: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_arm.deb Size/MD5 checksum: 1314146 21885ec226e0eef970c24d0bda2c087c http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_arm.deb Size/MD5 checksum: 664026 f7c2193f6a4a68a090aabafdb7297d1b HP Precision architecture: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_hppa.deb Size/MD5 checksum: 1376592 3cda3866a1e2fcf13e702e789ed075df http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_hppa.deb Size/MD5 checksum: 714314 9e491abd147dc046a3702269d9cd0d1b Intel IA-32 architecture: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_i386.deb Size/MD5 checksum: 1325060 0c438d6afad2fbd82f37fb2a92d2e109 http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_i386.deb Size/MD5 checksum: 671640 d448bedeaefc0de24d256a862401da14 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_ia64.deb Size/MD5 checksum: 1536618 c68927923c69e4d51e35df3bbca94736 http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_ia64.deb Size/MD5 checksum: 838730 9b10a09bb38f156ab2392774e123ca34 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_m68k.deb Size/MD5 checksum: 1282356 ce4945f7b57906ee710bc0fb1fc23d04 http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_m68k.deb Size/MD5 checksum: 639332 7e01f8968d3d7c3539164bcd5ddfe390 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_mips.deb Size/MD5 checksum: 1368274 72ad629b2802e1027517694a38c923e2 http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_mips.deb Size/MD5 checksum: 711436 8fc708e7101e00c668ba06247f851012 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_mipsel.deb Size/MD5 checksum: 1365494 de193ce83bc57ee5544410d306d563c4 http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_mipsel.deb Size/MD5 checksum: 709948 5f8a7bfba56f7c99f2318f7cb4bde8bb PowerPC architecture: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_powerpc.deb Size/MD5 checksum: 1351744 9fb15425d622021fc9d5aeb23a70077d http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_powerpc.deb Size/MD5 checksum: 692324 dc7a80d14cd4ec9b9f0ad66a0ff4d9ec IBM S/390 architecture: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_s390.deb Size/MD5 checksum: 1358028 f2d57e3e90678e07239b24c76462e3e4 http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_s390.deb Size/MD5 checksum: 707938 488e81b960f0cb8521e59d043039e6df Sun Sparc architecture: http://security.debian.org/pool/updates/main/e/elinks/elinks_0.10.4-7.1_sparc.deb Size/MD5 checksum: 1328470 f1430b94811c29d5e05ec9166d73884b http://security.debian.org/pool/updates/main/e/elinks/elinks-lite_0.10.4-7.1_sparc.deb Size/MD5 checksum: 672116 5db368ec717809649fe9c6cc590a0eb6 -- Debian GNU/Linux unstable alias sid -- Fixed in version 0.11.1-1.2. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1228 OTHER REFERENCES: SA22920: http://secunia.com/advisories/22920/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------