what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 22685

Secunia Security Advisory 22685
Posted Nov 6, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Trustix has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges, or by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
SHA-256 | 997ea932043777939d358624d6747ac436e4cd01383b47d1ffb55aa241618871

Secunia Security Advisory 22685

Change Mirror Download


----------------------------------------------------------------------

To improve our services to our customers, we have made a number of
additions to the Secunia Advisories and have started translating the
advisories to German.

The improvements will help our customers to get a better
understanding of how we reached our conclusions, how it was rated,
our thoughts on exploitation, attack vectors, and scenarios.

This includes:
* Reason for rating
* Extended description
* Extended solution
* Exploit code or links to exploit code
* Deep links

Read the full description:
http://corporate.secunia.com/products/48/?r=l

Contact Secunia Sales for more information:
http://corporate.secunia.com/how_to_buy/15/?r=l

----------------------------------------------------------------------

TITLE:
Trustix Update for Multiple Packages

SECUNIA ADVISORY ID:
SA22685

VERIFY ADVISORY:
http://secunia.com/advisories/22685/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, Privilege escalation, DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Trustix Secure Linux 2.2
http://secunia.com/product/4641/

DESCRIPTION:
Trustix has issued an update for multiple packages. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
perform certain actions with escalated privileges, or by malicious
people to bypass certain security restrictions, cause a DoS (Denial
of Service), or potentially compromise a vulnerable system.

For more information:
SA22613
SA22653
SA22682

SOLUTION:
Apply updated packages.

b4b6e1d65b18b7be38343176d987bc1e
2.2/rpms/ldapclients-common-183-1tr.i586.rpm
0cf605ece23c48ac9f96b036ead7c12e 2.2/rpms/mutt-1.4.2.1-6tr.i586.rpm
af0003f6290c968305ed59b96f33d9eb 2.2/rpms/pam_ldap-183-1tr.i586.rpm
9356c0eff6fa982e1e6b1a5557161328 2.2/rpms/php-5.2.0-1tr.i586.rpm
83ec93582363bf78c886ef246b76980e
2.2/rpms/php-cli-5.2.0-1tr.i586.rpm
19e0ba13d52129dc21ba6a645846569f
2.2/rpms/php-curl-5.2.0-1tr.i586.rpm
33bf33f853794d32a21c851ae7de1f98
2.2/rpms/php-devel-5.2.0-1tr.i586.rpm
43628cdb25431cb06a16a65591b2220a
2.2/rpms/php-exif-5.2.0-1tr.i586.rpm
a95a77bdfb6d80c28a18346198929f66
2.2/rpms/php-fcgi-5.2.0-1tr.i586.rpm
567d73bc467bbaff223b7363293a22cd 2.2/rpms/php-gd-5.2.0-1tr.i586.rpm
3d609748d897006c21a2af5554f96eda
2.2/rpms/php-imap-5.2.0-1tr.i586.rpm
d681d5010b77725c08891067d5224deb
2.2/rpms/php-ldap-5.2.0-1tr.i586.rpm
35cfde759d614c0cbfa05947e1be8ce6
2.2/rpms/php-mcrypt-5.2.0-1tr.i586.rpm
2da2d79481488eaec92aeb3a5ba33a80
2.2/rpms/php-mhash-5.2.0-1tr.i586.rpm
72c05352ae6d9cd8d4d443421e1b3f79
2.2/rpms/php-mysql-5.2.0-1tr.i586.rpm
8afbd4b3c4bc021ac99f3adcc860e0e2
2.2/rpms/php-mysqli-5.2.0-1tr.i586.rpm
62bca20622f348b1898d3d7cca541847
2.2/rpms/php-openssl-5.2.0-1tr.i586.rpm
6e18746564365472ceedab08cb692440
2.2/rpms/php-pdo-mysql-5.2.0-1tr.i586.rpm
c0688f00635eebab0e197b374dcac9c7
2.2/rpms/php-pdo-sqlite-5.2.0-1tr.i586.rpm
b91c77a4d9016f74699b214b0a7e8549
2.2/rpms/php-pgsql-5.2.0-1tr.i586.rpm
fee0431b47cb04f2359d29490e327265
2.2/rpms/php-sqlite-5.2.0-1tr.i586.rpm
ec4c19faca69e22029e1884578ff88a2
2.2/rpms/php-zlib-5.2.0-1tr.i586.rpm

ORIGINAL ADVISORY:
http://www.trustix.org/errata/2006/0061/

OTHER REFERENCES:
SA22613:
http://secunia.com/advisories/22613/

SA22653:
http://secunia.com/advisories/22653/

SA22682:
http://secunia.com/advisories/22682/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close