|
|
[ Message Precedent sur la mailing][ Message Suivant sur la mailing][ Precedent dans le fil][ Prochain dans le fil][ Index par Date][ Index par fil]
[SA32530] Ubuntu update for enscript
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details:
link://[click]
TITLE:
Ubuntu update for enscript
SECUNIA ADVISORY ID:
SA32530
VERIFY ADVISORY:
link://[click]
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
From remote
OPERATING SYSTEM:
Ubuntu Linux 6.06
link://[click]
Ubuntu Linux 7.10
link://[click]
Ubuntu Linux 8.04
link://[click]
Ubuntu Linux 8.10
link://[click]
DESCRIPTION:
Ubuntu has issued an update for enscript. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.
For more information:
SA32137
SOLUTION:
Apply updated packages.
-- Ubuntu 6.06 LTS --
Source archives:
link://[click]
Size/MD5: 21257 099ec23f341d2d17283bde9b36942ab6
link://[click]
Size/MD5: 674 432f64fe62d7d29e13872525726cb032
link://[click]
Size/MD5: 1036734 b5174b59e4a050fb462af5dbf28ebba3
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
link://[click]
Size/MD5: 423482 636c62e47e3e73b9389b47bfcc8c6647
i386 architecture (x86 compatible Intel/AMD):
link://[click]
Size/MD5: 405530 41f6c81e90905043fa9018d8f4e30457
powerpc architecture (Apple Macintosh G3/G4/G5):
link://[click]
Size/MD5: 419126 6c80126f37f4800f0507329dd6bb0aa3
sparc architecture (Sun SPARC/UltraSPARC):
link://[click]
Size/MD5: 411222 47084632ebb468a3d13f52dcee9dd977
-- Ubuntu 7.10 --
Source archives:
link://[click]
Size/MD5: 91026 c788b4b331ad7ddd6a2743ae27f725a4
link://[click]
Size/MD5: 767 084a84daf7f8b47f2ac3bf3debb995ea
link://[click]
Size/MD5: 1036734 b5174b59e4a050fb462af5dbf28ebba3
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
link://[click]
Size/MD5: 425468 5f020fcebfffb46ed32cc6ae50939972
i386 architecture (x86 compatible Intel/AMD):
link://[click]
Size/MD5: 411500 3f7ebb92b6a87efce2ec18ad2cbed2d3
lpia architecture (Low Power Intel Architecture):
link://[click]
Size/MD5: 414372 3630143c4898a99a48a13bd5899f003c
powerpc architecture (Apple Macintosh G3/G4/G5):
link://[click]
Size/MD5: 424744 bbd80756d675ae285b7bfec9992fbc55
sparc architecture (Sun SPARC/UltraSPARC):
link://[click]
Size/MD5: 415382 f665b649a786296363e17fd6f560bb0f
-- Ubuntu 8.04 LTS --
Source archives:
link://[click]
Size/MD5: 93119 62c2bd2cef254af68bd2fa0c7d1d36f3
link://[click]
Size/MD5: 774 7cb02960688d0e9fb17f30bc7932577e
link://[click]
Size/MD5: 1036734 b5174b59e4a050fb462af5dbf28ebba3
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
link://[click]
Size/MD5: 425882 56b5c201eba9f4ccba832d9de0277b6a
i386 architecture (x86 compatible Intel/AMD):
link://[click]
Size/MD5: 412426 7e5bd9e9ed8d8a69e01f112ace8bf9d8
lpia architecture (Low Power Intel Architecture):
link://[click]
Size/MD5: 414800 6c3584e7ca1dc88917d3f24298cbd78b
powerpc architecture (Apple Macintosh G3/G4/G5):
link://[click]
Size/MD5: 426356 c9efe8d867bdcf618857c2eb6a140d6b
sparc architecture (Sun SPARC/UltraSPARC):
link://[click]
Size/MD5: 415802 0d13cb614bbaefb045515c3ac223c5a6
-- Ubuntu 8.10 --
Source archives:
link://[click]
Size/MD5: 93116 0338194240bae030e8150e47ac40208d
link://[click]
Size/MD5: 1188 ac3234ebd2b48790ac95d4d1baae83e8
link://[click]
Size/MD5: 1036734 b5174b59e4a050fb462af5dbf28ebba3
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
link://[click]
Size/MD5: 428584 64a869b979b5d62ff169b68e322ae43f
i386 architecture (x86 compatible Intel/AMD):
link://[click]
Size/MD5: 415574 25eb8ba34f468dd58a6ddf607d54e434
lpia architecture (Low Power Intel Architecture):
link://[click]
Size/MD5: 416772 9ec0d324ce07b50261acc2896618a46f
powerpc architecture (Apple Macintosh G3/G4/G5):
link://[click]
Size/MD5: 426934 5aa206fa2bee1d271672ce6041e8616b
sparc architecture (Sun SPARC/UltraSPARC):
link://[click]
Size/MD5: 418004 97edf96856ff530d88075b3076cc037e
ORIGINAL ADVISORY:
USN-660-1:
link://[click]
OTHER REFERENCES:
SA32137:
link://[click]
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
link://[click]
Definitions: (Criticality, Where etc.)
link://[click]
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|