|
|
[ Message Precedent sur la mailing][ Message Suivant sur la mailing][ Precedent dans le fil][ Prochain dans le fil][ Index par Date][ Index par fil]
[SA33871] Debian update for typo3-src
Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?
Click here to learn more:
link://[click]
TITLE:
Debian update for typo3-src
SECUNIA ADVISORY ID:
SA33871
VERIFY ADVISORY:
link://[click]
CRITICAL:
Moderately critical
IMPACT:
Cross Site Scripting, Exposure of system information, Exposure of
sensitive information
WHERE:
From remote
OPERATING SYSTEM:
Debian GNU/Linux 4.0
link://[click]
Debian GNU/Linux unstable alias sid
link://[click]
DESCRIPTION:
Debian has issued an update for typo3-src. This fixes some
vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting attacks and disclose sensitive
information.
For more information:
SA33829
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 4.0 alias etch --
Source archives:
link://[click]
Size/MD5 checksum: 618 8a7ebb8edf133224fc8c552c12b6cb3d
link://[click]
Size/MD5 checksum: 24943 588b00a669ba0db62551749d9379a0ce
link://[click]
Size/MD5 checksum: 7683527 be509391b0e4d24278c14100c09dc673
Architecture independent components:
link://[click]
Size/MD5 checksum: 7677310 456187cb35360f2f9b35ab54fb8d6db5
link://[click]
Size/MD5 checksum: 77252 87ceec7498d3df3436dc0a663088d2b6
-- Debian GNU/Linux unstable alias sid --
Fixed in version 4.2.6-1.
ORIGINAL ADVISORY:
DSA-1720-1:
link://[click]
OTHER REFERENCES:
SA33829:
link://[click]
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
link://[click]
Definitions: (Criticality, Where etc.)
link://[click]
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|