---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Debian update for pam_ldap SECUNIA ADVISORY ID: SA22694 VERIFY ADVISORY: http://secunia.com/advisories/22694/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for pam_ldap. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. For more information: SA22682 SOLUTION: Apply updated packages. Note: There are no updated packages for the Sun Sparc architecture. Reportedly, these will be available soon. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1.dsc Size/MD5 checksum: 636 e49dbc2f884aef5f5be87ee4e81c3d83 http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1.diff.gz Size/MD5 checksum: 33782 659bf15bbbb31817ebad9372c8827618 http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2.orig.tar.gz Size/MD5 checksum: 840519 ed68ea9b43d9fba0972cb017a24940a1 Alpha architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_alpha.deb Size/MD5 checksum: 629958 ed0ff830958e515c4cfe7578c3cbd43b AMD64 architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_amd64.deb Size/MD5 checksum: 599552 c6b981d25812347be756677294dbb91e ARM architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_arm.deb Size/MD5 checksum: 588386 a6a0e9b44c193c70207977a0a850a33c HP Precision architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_hppa.deb Size/MD5 checksum: 605298 312f40458406384986d369c69fec651f Intel IA-32 architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_i386.deb Size/MD5 checksum: 581822 0d04f818e84bba320ae7af77463a83f3 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_ia64.deb Size/MD5 checksum: 682540 f1ffda25938b5e08e80ed581a24a0311 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_m68k.deb Size/MD5 checksum: 560314 693600b1df1c4a87f281365a1102d780 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_mips.deb Size/MD5 checksum: 603124 4eb62645164745cbb946539e0c11af7c Little endian MIPS architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_mipsel.deb Size/MD5 checksum: 603336 8225a911fb5206aefafc8bd16813ce48 PowerPC architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_powerpc.deb Size/MD5 checksum: 593248 8fab93a81f23a478171c8dab6b21bc78 IBM S/390 architecture: http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_s390.deb Size/MD5 checksum: 597560 5bb4d6445f7e433f8adab4b33e9e51fc -- Debian GNU/Linux unstable alias sid -- Fixed in version 180-1.2. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1203 OTHER REFERENCES: SA22682: http://secunia.com/advisories/22682/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------