Secunia Security Advisory - Trustix has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges, or by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a vulnerable system.
997ea932043777939d358624d6747ac436e4cd01383b47d1ffb55aa241618871
----------------------------------------------------------------------
To improve our services to our customers, we have made a number of
additions to the Secunia Advisories and have started translating the
advisories to German.
The improvements will help our customers to get a better
understanding of how we reached our conclusions, how it was rated,
our thoughts on exploitation, attack vectors, and scenarios.
This includes:
* Reason for rating
* Extended description
* Extended solution
* Exploit code or links to exploit code
* Deep links
Read the full description:
http://corporate.secunia.com/products/48/?r=l
Contact Secunia Sales for more information:
http://corporate.secunia.com/how_to_buy/15/?r=l
----------------------------------------------------------------------
TITLE:
Trustix Update for Multiple Packages
SECUNIA ADVISORY ID:
SA22685
VERIFY ADVISORY:
http://secunia.com/advisories/22685/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Privilege escalation, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Trustix Secure Linux 2.2
http://secunia.com/product/4641/
DESCRIPTION:
Trustix has issued an update for multiple packages. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
perform certain actions with escalated privileges, or by malicious
people to bypass certain security restrictions, cause a DoS (Denial
of Service), or potentially compromise a vulnerable system.
For more information:
SA22613
SA22653
SA22682
SOLUTION:
Apply updated packages.
b4b6e1d65b18b7be38343176d987bc1e
2.2/rpms/ldapclients-common-183-1tr.i586.rpm
0cf605ece23c48ac9f96b036ead7c12e 2.2/rpms/mutt-1.4.2.1-6tr.i586.rpm
af0003f6290c968305ed59b96f33d9eb 2.2/rpms/pam_ldap-183-1tr.i586.rpm
9356c0eff6fa982e1e6b1a5557161328 2.2/rpms/php-5.2.0-1tr.i586.rpm
83ec93582363bf78c886ef246b76980e
2.2/rpms/php-cli-5.2.0-1tr.i586.rpm
19e0ba13d52129dc21ba6a645846569f
2.2/rpms/php-curl-5.2.0-1tr.i586.rpm
33bf33f853794d32a21c851ae7de1f98
2.2/rpms/php-devel-5.2.0-1tr.i586.rpm
43628cdb25431cb06a16a65591b2220a
2.2/rpms/php-exif-5.2.0-1tr.i586.rpm
a95a77bdfb6d80c28a18346198929f66
2.2/rpms/php-fcgi-5.2.0-1tr.i586.rpm
567d73bc467bbaff223b7363293a22cd 2.2/rpms/php-gd-5.2.0-1tr.i586.rpm
3d609748d897006c21a2af5554f96eda
2.2/rpms/php-imap-5.2.0-1tr.i586.rpm
d681d5010b77725c08891067d5224deb
2.2/rpms/php-ldap-5.2.0-1tr.i586.rpm
35cfde759d614c0cbfa05947e1be8ce6
2.2/rpms/php-mcrypt-5.2.0-1tr.i586.rpm
2da2d79481488eaec92aeb3a5ba33a80
2.2/rpms/php-mhash-5.2.0-1tr.i586.rpm
72c05352ae6d9cd8d4d443421e1b3f79
2.2/rpms/php-mysql-5.2.0-1tr.i586.rpm
8afbd4b3c4bc021ac99f3adcc860e0e2
2.2/rpms/php-mysqli-5.2.0-1tr.i586.rpm
62bca20622f348b1898d3d7cca541847
2.2/rpms/php-openssl-5.2.0-1tr.i586.rpm
6e18746564365472ceedab08cb692440
2.2/rpms/php-pdo-mysql-5.2.0-1tr.i586.rpm
c0688f00635eebab0e197b374dcac9c7
2.2/rpms/php-pdo-sqlite-5.2.0-1tr.i586.rpm
b91c77a4d9016f74699b214b0a7e8549
2.2/rpms/php-pgsql-5.2.0-1tr.i586.rpm
fee0431b47cb04f2359d29490e327265
2.2/rpms/php-sqlite-5.2.0-1tr.i586.rpm
ec4c19faca69e22029e1884578ff88a2
2.2/rpms/php-zlib-5.2.0-1tr.i586.rpm
ORIGINAL ADVISORY:
http://www.trustix.org/errata/2006/0061/
OTHER REFERENCES:
SA22613:
http://secunia.com/advisories/22613/
SA22653:
http://secunia.com/advisories/22653/
SA22682:
http://secunia.com/advisories/22682/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------