VARIoT IoT vulnerabilities database

VAR-200802-0021 | CVE-2008-0075 | Microsoft IIS of ASP Vulnerability in arbitrary code execution related to page input |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.1 through 6.0 allows remote attackers to execute arbitrary code via crafted inputs to ASP pages.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
SOLUTION:
Apply patches.
Windows XP Professional SP2:
http://www.microsoft.com/downloads/details.aspx?FamilyID=2b498065-d682-4227-b23e-d234d7d6a3fe
Windows XP Professional x64 Edition (optionally with SP2):
http://www.microsoft.com/downloads/details.aspx?FamilyID=df9875f7-04d6-486e-bdb5-35e9e305fa1d
Windows Server 2003 SP1 / SP2:
http://www.microsoft.com/downloads/details.aspx?FamilyID=6583e798-d16d-419c-aee1-30c3e6c635b3
Windows Server 2003 x64 Edition (optionally with SP2):
http://www.microsoft.com/downloads/details.aspx?familyid=e8286174-8209-409f-8805-e534715a741c
Windows Server 2003 with SP1/SP2 for Itanium-based systems:
http://www.microsoft.com/downloads/details.aspx?familyid=29faa70d-f1ac-4da4-b72a-faf1973cd845
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
MS08-006 (KB942830):
http://www.microsoft.com/technet/security/Bulletin/MS08-006.mspx
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA08-043C
Microsoft Updates for Multiple Vulnerabilities
Original release date: February 12, 2008
Last revised: February 12, 2008
Source: US-CERT
Systems Affected
* Microsoft Windows
* Microsoft Internet Explorer
* Microsoft Office
* Microsoft Visual Basic
* Microsoft Internet Information Services (IIS)
Overview
Microsoft has released updates that address critical vulnerabilities
in Microsoft Windows, Internet Explorer, Office, Visual Basic and
Internet Information Services (IIS).
I. Description
Microsoft has released updates to address vulnerabilities that affect
Microsoft Windows, Internet Explorer, Office, Visual Basic and
Internet Information Services (IIS) as part of the Microsoft Security
Bulletin Summary for February 2008. For more information, see the US-CERT Vulnerability Notes
Database.
II.
III. Solution
Apply updates from Microsoft
Microsoft has provided updates for these vulnerabilities in the
February 2008 security bulletins. The security bulletins describe any
known issues related to the updates. Administrators are encouraged to
note these issues and test for any potentially adverse effects.
Administrators should consider using an automated update distribution
system such as Windows Server Update Services (WSUS).
IV. References
* US-CERT Vulnerability Notes for Microsoft February 2008 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms08-feb>
* Microsoft Security Bulletin Summary for February 2008 - <http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx>
* Microsoft Update - <https://www.update.microsoft.com/microsoftupdate/>
* Windows Server Update Services - <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>
_________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA08-043C.html>
_________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA08-043C Feedback VU#104665" in the
subject.
_________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
_________________________________________________________________
Produced 2008 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
_________________________________________________________________
Revision History
February 12, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBR7IkKvRFkHkM87XOAQIMdgf/Z4QINqEeDeTdbKj9Jn4K+v5WKr+GWL0R
J3C7PfJyQvqnl0ctnqF4DOBvi8xgPXWuhCqh6XEgi7ImkJVxI8HPpy1gj8K9YC5J
ZDidLPOPvo3suzeEw3pNX/9oN9sOSsvCxwkzgq3cw7e3/vh69zLJWEg3Mz5Vc0UC
lU8u4HLMpDFXzn2NA3/YlTDyc45OV3Z5LCA8GHkqIBzZLZUtprIjIeXBOxbY3pqw
Ac9f8FB5c88PHW8+34pXmzt7QXuynW+8yrCuApIc0ZduUpB1+7Pi1aVmDwxxGdSz
GUP3Ue8minBwUIyBn3h1jxUwO7nADPToVVLHj8fwHaFXvoNQha8iKg==
=imPA
-----END PGP SIGNATURE-----
VAR-200802-0020 | CVE-2008-0074 | Microsoft IIS Elevation of Privilege Vulnerability in File Change Notification |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders.
A local attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
SOLUTION:
Apply patches.
Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?familyid=b24f34fb-40b9-4aa5-b5ac-e3f0a6062753
Windows XP Professional SP2:
http://www.microsoft.com/downloads/details.aspx?familyid=73d24fcf-bea9-4b13-9f1c-4e068c53a4ae
Windows XP Professional x64 Edition (optionally with SP2):
http://www.microsoft.com/downloads/details.aspx?familyid=103a6bc0-034a-443d-b1d4-81117820dcb2
Windows Server 2003 SP1 / SP2:
http://www.microsoft.com/downloads/details.aspx?familyid=516ef8e8-3cb6-4660-b771-3c7f66917a11
Windows Server 2003 x64 Edition (optionally SP2):
http://www.microsoft.com/downloads/details.aspx?familyid=e24fb33c-67b9-4ed4-9317-b5fd535d005a
Windows Server 2003 with SP1/SP2 for Itanium-based systems:
http://www.microsoft.com/downloads/details.aspx?familyid=5a4a6083-8c67-4403-8e20-7f2b82178124
Windows Vista:
http://www.microsoft.com/downloads/details.aspx?familyid=8c7018ec-ae80-4a30-93fc-0f7386732514
Windows Vista x64 Edition:
http://www.microsoft.com/downloads/details.aspx?familyid=4de2fffc-5793-4acf-98ee-1b801e59ae39
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
MS08-005 (KB942831):
http://www.microsoft.com/technet/security/Bulletin/MS08-005.mspx
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA08-043C
Microsoft Updates for Multiple Vulnerabilities
Original release date: February 12, 2008
Last revised: February 12, 2008
Source: US-CERT
Systems Affected
* Microsoft Windows
* Microsoft Internet Explorer
* Microsoft Office
* Microsoft Visual Basic
* Microsoft Internet Information Services (IIS)
Overview
Microsoft has released updates that address critical vulnerabilities
in Microsoft Windows, Internet Explorer, Office, Visual Basic and
Internet Information Services (IIS).
I. Description
Microsoft has released updates to address vulnerabilities that affect
Microsoft Windows, Internet Explorer, Office, Visual Basic and
Internet Information Services (IIS) as part of the Microsoft Security
Bulletin Summary for February 2008. For more information, see the US-CERT Vulnerability Notes
Database.
II.
III. Solution
Apply updates from Microsoft
Microsoft has provided updates for these vulnerabilities in the
February 2008 security bulletins. The security bulletins describe any
known issues related to the updates. Administrators are encouraged to
note these issues and test for any potentially adverse effects.
Administrators should consider using an automated update distribution
system such as Windows Server Update Services (WSUS).
IV. References
* US-CERT Vulnerability Notes for Microsoft February 2008 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms08-feb>
* Microsoft Security Bulletin Summary for February 2008 - <http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx>
* Microsoft Update - <https://www.update.microsoft.com/microsoftupdate/>
* Windows Server Update Services - <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>
_________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA08-043C.html>
_________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA08-043C Feedback VU#104665" in the
subject.
_________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
_________________________________________________________________
Produced 2008 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
_________________________________________________________________
Revision History
February 12, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBR7IkKvRFkHkM87XOAQIMdgf/Z4QINqEeDeTdbKj9Jn4K+v5WKr+GWL0R
J3C7PfJyQvqnl0ctnqF4DOBvi8xgPXWuhCqh6XEgi7ImkJVxI8HPpy1gj8K9YC5J
ZDidLPOPvo3suzeEw3pNX/9oN9sOSsvCxwkzgq3cw7e3/vh69zLJWEg3Mz5Vc0UC
lU8u4HLMpDFXzn2NA3/YlTDyc45OV3Z5LCA8GHkqIBzZLZUtprIjIeXBOxbY3pqw
Ac9f8FB5c88PHW8+34pXmzt7QXuynW+8yrCuApIc0ZduUpB1+7Pi1aVmDwxxGdSz
GUP3Ue8minBwUIyBn3h1jxUwO7nADPToVVLHj8fwHaFXvoNQha8iKg==
=imPA
-----END PGP SIGNATURE-----
VAR-200908-0116 | CVE-2008-7032 |
F5 BIG-IP of Web Management console cross-site request forgery vulnerability
Related entries in the VARIoT exploits database: VAR-E-200802-0133 |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Web Management Console Cross-site request forgery (CSRF) vulnerability in the web management console in F5 BIG-IP 9.4.3 allows remote attackers to hijack the authentication of administrators for requests that create new administrators and execute shell commands, as demonstrated using tmui/Control/form. F5 BIG-IP is prone to a cross-site request-forgery vulnerability.
Exploiting this issue may allow a remote attacker to execute arbitrary actions on an affected device.
F5 BIG-IP 9.4.3 is vulnerable; other versions may also be affected. F5 BIG-IP is a load balancer. A remote attacker could hijack authentication of administrator requests
VAR-200802-0651 | CVE-2008-0420 | Mozilla Firefox/SeaMonkey Vulnerability in uninitialized memory being read |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
modules/libpr0n/decoders/bmp/nsBMPDecoder.cpp in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 does not properly perform certain calculations related to the mColors table, which allows remote attackers to read portions of memory uninitialized via a crafted 8-bit bitmap (BMP) file that triggers an out-of-bounds read within the heap, as demonstrated using a CANVAS element; or cause a denial of service (application crash) via a crafted 8-bit bitmap file that triggers an out-of-bounds read. NOTE: the initial public reports stated that this affected Firefox in Ubuntu 6.06 through 7.10. Firefox and Opera browsers are prone to a vulnerability that can result in information disclosure or a denial of service.
An attacker can exploit this issue to harvest sensitive information that may be used to launch further attacks or to crash the affected application, denying service to legitimate users.
Mozilla Firefox 2.0.0.11 and Opera 9.50 Beta are affected. This vulnerability is related to CVE-2008-0420. The upstream
fixes were incomplete, and after performing certain actions Thunderbird
would crash due to memory errors. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that Thunderbird did not properly set the size of a
buffer when parsing an external-body MIME-type. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200805-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Mozilla products: Multiple vulnerabilities
Date: May 20, 2008
Bugs: #208128, #214816, #218065
ID: 200805-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been reported in Mozilla Firefox,
Thunderbird, SeaMonkey and XULRunner, some of which may allow
user-assisted execution of arbitrary code.
Background
==========
Mozilla Firefox is an open-source web browser and Mozilla Thunderbird
an open-source email client, both from the Mozilla Project. The
SeaMonkey project is a community effort to deliver production-quality
releases of code derived from the application formerly known as the
'Mozilla Application Suite'. XULRunner is a Mozilla runtime package
that can be used to bootstrap XUL+XPCOM applications like Firefox and
Thunderbird.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 mozilla-firefox < 2.0.0.14 >= 2.0.0.14
2 mozilla-firefox-bin < 2.0.0.14 >= 2.0.0.14
3 mozilla-thunderbird < 2.0.0.14 >= 2.0.0.14
4 mozilla-thunderbird-bin < 2.0.0.14 >= 2.0.0.14
5 seamonkey < 1.1.9-r1 >= 1.1.9-r1
6 seamonkey-bin < 1.1.9 >= 1.1.9
7 xulrunner < 1.8.1.14 >= 1.8.1.14
-------------------------------------------------------------------
7 affected packages on all of their supported architectures.
-------------------------------------------------------------------
Description
===========
The following vulnerabilities were reported in all mentioned Mozilla
products:
* Jesse Ruderman, Kai Engert, Martijn Wargers, Mats Palmgren, and
Paul Nickerson reported browser crashes related to JavaScript
methods, possibly triggering memory corruption (CVE-2008-0412).
* Carsten Book, Wesley Garland, Igor Bukanov, moz_bug_r_a4, shutdown,
Philip Taylor, and tgirmann reported crashes in the JavaScript
engine, possibly triggering memory corruption (CVE-2008-0413).
* David Bloom discovered a vulnerability in the way images are
treated by the browser when a user leaves a page, possibly triggering
memory corruption (CVE-2008-0419).
* moz_bug_r_a4, Boris Zbarsky, and Johnny Stenback reported a series
of privilege escalation vulnerabilities related to JavaScript
(CVE-2008-1233, CVE-2008-1234, CVE-2008-1235).
* Mozilla developers identified browser crashes caused by the layout
and JavaScript engines, possibly triggering memory corruption
(CVE-2008-1236, CVE-2008-1237).
* moz_bug_r_a4 and Boris Zbarsky discovered that pages could escape
from its sandboxed context and run with chrome privileges, and inject
script content into another site, violating the browser's same origin
policy (CVE-2008-0415).
* Gerry Eisenhaur discovered a directory traversal vulnerability when
using "flat" addons (CVE-2008-0418).
* Alexey Proskuryakov, Yosuke Hasegawa and Simon Montagu reported
multiple character handling flaws related to the backspace character,
the "0x80" character, involving zero-length non-ASCII sequences in
multiple character sets, that could facilitate Cross-Site Scripting
attacks (CVE-2008-0416).
The following vulnerability was reported in Thunderbird and SeaMonkey:
* regenrecht (via iDefense) reported a heap-based buffer overflow
when rendering an email message with an external MIME body
(CVE-2008-0304).
The following vulnerabilities were reported in Firefox, SeaMonkey and
XULRunner:
* The fix for CVE-2008-1237 in Firefox 2.0.0.13 and SeaMonkey 1.1.9
introduced a new crash vulnerability (CVE-2008-1380).
* hong and Gregory Fleischer each reported a variant on earlier
reported bugs regarding focus shifting in file input controls
(CVE-2008-0414).
* Gynvael Coldwind (Vexillium) discovered that BMP images could be
used to reveal uninitialized memory, and that this data could be
extracted using a "canvas" feature (CVE-2008-0420).
* Chris Thomas reported that background tabs could create a
borderless XUL pop-up in front of pages in other tabs
(CVE-2008-1241).
* oo.rio.oo discovered that a plain text file with a
"Content-Disposition: attachment" prevents Firefox from rendering
future plain text files within the browser (CVE-2008-0592).
* Martin Straka reported that the ".href" property of stylesheet DOM
nodes is modified to the final URI of a 302 redirect, bypassing the
same origin policy (CVE-2008-0593).
* Gregory Fleischer discovered that under certain circumstances,
leading characters from the hostname part of the "Referer:" HTTP
header are removed (CVE-2008-1238).
* Peter Brodersen and Alexander Klink reported that the browser
automatically selected and sent a client certificate when SSL Client
Authentication is requested by a server (CVE-2007-4879).
* Gregory Fleischer reported that web content fetched via the "jar:"
protocol was not subject to network access restrictions
(CVE-2008-1240).
The following vulnerabilities were reported in Firefox:
* Justin Dolske discovered a CRLF injection vulnerability when
storing passwords (CVE-2008-0417).
* Michal Zalewski discovered that Firefox does not properly manage a
delay timer used in confirmation dialogs (CVE-2008-0591).
* Emil Ljungdahl and Lars-Olof Moilanen discovered that a web forgery
warning dialog is not displayed if the entire contents of a web page
are in a DIV tag that uses absolute positioning (CVE-2008-0594).
Impact
======
A remote attacker could entice a user to view a specially crafted web
page or email that will trigger one of the vulnerabilities, possibly
leading to the execution of arbitrary code or a Denial of Service. It
is also possible for an attacker to trick a user to upload arbitrary
files when submitting a form, to corrupt saved passwords for other
sites, to steal login credentials, or to conduct Cross-Site Scripting
and Cross-Site Request Forgery attacks.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Mozilla Firefox users should upgrade to the latest version:
# emerge --sync
# emerge --ask -1 -v ">=www-client/mozilla-firefox-2.0.0.14"
All Mozilla Firefox binary users should upgrade to the latest version:
# emerge --sync
# emerge --ask -1 -v ">=www-client/mozilla-firefox-bin-2.0.0.14"
All Mozilla Thunderbird users should upgrade to the latest version:
# emerge --sync
# emerge --ask -1 -v ">=mail-client/mozilla-thunderbird-2.0.0.14"
All Mozilla Thunderbird binary users should upgrade to the latest
version:
# emerge --sync
# emerge -a -1 -v ">=mail-client/mozilla-thunderbird-bin-2.0.0.14"
All SeaMonkey users should upgrade to the latest version:
# emerge --sync
# emerge --ask -1 -v ">=www-client/seamonkey-1.1.9-r1"
All SeaMonkey binary users should upgrade to the latest version:
# emerge --sync
# emerge --ask -1 -v ">=www-client/seamonkey-bin-1.1.9"
All XULRunner users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/xulrunner-1.8.1.14"
NOTE: The crash vulnerability (CVE-2008-1380) is currently unfixed in
the SeaMonkey binary ebuild, as no precompiled packages have been
released. Until an update is available, we recommend all SeaMonkey
users to disable JavaScript, use Firefox for JavaScript-enabled
browsing, or switch to the SeaMonkey source ebuild.
References
==========
[ 1 ] CVE-2007-4879
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879
[ 2 ] CVE-2008-0304
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304
[ 3 ] CVE-2008-0412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412
[ 4 ] CVE-2008-0413
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413
[ 5 ] CVE-2008-0414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414
[ 6 ] CVE-2008-0415
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415
[ 7 ] CVE-2008-0416
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416
[ 8 ] CVE-2008-0417
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417
[ 9 ] CVE-2008-0418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418
[ 10 ] CVE-2008-0419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419
[ 11 ] CVE-2008-0420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420
[ 12 ] CVE-2008-0591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591
[ 13 ] CVE-2008-0592
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592
[ 14 ] CVE-2008-0593
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593
[ 15 ] CVE-2008-0594
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594
[ 16 ] CVE-2008-1233
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233
[ 17 ] CVE-2008-1234
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234
[ 18 ] CVE-2008-1235
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235
[ 19 ] CVE-2008-1236
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236
[ 20 ] CVE-2008-1237
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237
[ 21 ] CVE-2008-1238
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238
[ 22 ] CVE-2008-1240
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240
[ 23 ] CVE-2008-1241
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241
[ 24 ] CVE-2008-1380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200805-18.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2008 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. ===========================================================
Ubuntu Security Notice USN-576-1 February 08, 2008
firefox vulnerabilities
CVE-2008-0412, CVE-2008-0413, CVE-2008-0414, CVE-2008-0415,
CVE-2008-0416, CVE-2008-0417, CVE-2008-0418, CVE-2008-0419,
CVE-2008-0420, CVE-2008-0591, CVE-2008-0592, CVE-2008-0593,
CVE-2008-0594
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
Ubuntu 7.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
firefox 1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1
Ubuntu 6.10:
firefox 2.0.0.12+0nobinonly+2-0ubuntu0.6.10
Ubuntu 7.04:
firefox 2.0.0.12+1nobinonly+2-0ubuntu0.7.4
Ubuntu 7.10:
firefox 2.0.0.12+2nobinonly+2-0ubuntu0.7.10
After a standard system upgrade you need to restart firefox to effect
the necessary changes.
Details follow:
Various flaws were discovered in the browser and JavaScript engine.
(CVE-2008-0412, CVE-2008-0413)
Flaws were discovered in the file upload form control. A malicious
website could force arbitrary files from the user's computer to be
uploaded without consent. (CVE-2008-0414)
Various flaws were discovered in the JavaScript engine. (CVE-2008-0415)
Various flaws were discovered in character encoding handling. If a
user were ticked into opening a malicious web page, an attacker
could perform cross-site scripting attacks. (CVE-2008-0416)
Justin Dolske discovered a flaw in the password saving mechanism. By
tricking a user into opening a malicious web page, an attacker could
corrupt the user's stored passwords. Under certain circumstances, an
attacker may be able to load files or steal session data. Ubuntu is
not vulnerable in the default installation. A malicious website could exploit this to steal the user's
history information, crash the browser and/or possibly execute
arbitrary code with the user's privileges. (CVE-2008-0419)
Flaws were discovered in the BMP decoder. By tricking a user into
opening a specially crafted BMP file, an attacker could obtain
sensitive information. (CVE-2008-0420)
Michal Zalewski discovered flaws with timer-enabled security dialogs.
A malicious website could force the user to confirm a security dialog
without explicit consent. (CVE-2008-0592)
Martin Straka discovered flaws in stylesheet handling after a 302
redirect. By tricking a user into opening a malicious web page, an
attacker could obtain sensitive URL parameters. A
malicious website could exploit this to conduct phishing attacks
against the user. (CVE-2008-0594)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1.diff.gz
Size/MD5: 178154 2cf6b393f77f5b872ffac9f05901d86e
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1.dsc
Size/MD5: 1792 25c9c6c7c68cd2ffb437ff3c235ccf5b
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080202a.orig.tar.gz
Size/MD5: 48567134 5f38febe80dd0965ea410ac190a99a79
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_all.deb
Size/MD5: 53122 9b8108791fa1acc6a8cd36174d7e004f
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_all.deb
Size/MD5: 52236 39ada1e6aeb7b51289c70c71d0f8031e
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_amd64.deb
Size/MD5: 47575618 166e66c75fe45216b3ed03b2017ad9f9
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_amd64.deb
Size/MD5: 2863920 c4fb4492c9c0d33c5ee1ebaa90822add
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_amd64.deb
Size/MD5: 85508 22e0f29c67b28b7f268d13c47ff21b18
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_amd64.deb
Size/MD5: 9477254 da7188d3d1a255f46d703b7f9f4af558
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_amd64.deb
Size/MD5: 222308 66948fa52f626e2e94c277582dd9b419
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_amd64.deb
Size/MD5: 165292 f14d66384255da7196da5786244d7636
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_amd64.deb
Size/MD5: 247344 915feb3274a401c8cf7a026c6bcef55d
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_amd64.deb
Size/MD5: 824986 ee41c39f0dc78dcb269e2c849d7a959b
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_amd64.deb
Size/MD5: 219314 6ff861dde457e29b7d78cb0b485cc892
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_i386.deb
Size/MD5: 44132276 7d2488c56e8fc420b7d4b8741842a8d2
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_i386.deb
Size/MD5: 2863958 3e65d51503bf4220df6523ad788250c0
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_i386.deb
Size/MD5: 77834 58eaaaa178b0775221215bcbc18eb618
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_i386.deb
Size/MD5: 7986002 634c8d5dc00d42acac3319a6d8484401
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_i386.deb
Size/MD5: 222308 84d7212ebc789c76cbe907c1600a77e6
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_i386.deb
Size/MD5: 149850 9373d8373c10536f85d13a5a176889e3
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_i386.deb
Size/MD5: 247320 9ae55bba5c7cbe340db54c567fca6158
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_i386.deb
Size/MD5: 716594 5e6581e7b8f83755ee6182dc522a16d9
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_i386.deb
Size/MD5: 212712 42d4658e91e8dcab0cdc85b0da6ec700
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_powerpc.deb
Size/MD5: 48978594 143d1dd5a6ce245fc55c5083749aaecc
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_powerpc.deb
Size/MD5: 2864070 9c399a5d23e6338f5d663606a3c1fe6e
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_powerpc.deb
Size/MD5: 80948 c11c970fa9e3c95a2c7e28be5978d7ca
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_powerpc.deb
Size/MD5: 9097372 a1865d328a9fa56f46ae4fb1bd6757d9
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_powerpc.deb
Size/MD5: 222306 76bc431137ce8c72c4d097c15af86785
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_powerpc.deb
Size/MD5: 162552 309fd0bb01d24a983e187fe50da1e8ea
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_powerpc.deb
Size/MD5: 247346 d6d3ea02f9c3dd500d308215caa50fa8
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_powerpc.deb
Size/MD5: 815602 c939dd4eb7d5e514b86fb6756c3258c5
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_powerpc.deb
Size/MD5: 216154 f4f8d3b69f847ddfd238a8fbef952953
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_sparc.deb
Size/MD5: 45531866 273486483a76cc366c7f22d50a8e1585
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_sparc.deb
Size/MD5: 2864002 48d560e88b2a92576e1a4ee592297ce6
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_sparc.deb
Size/MD5: 79414 70c392f787204334116e9ce76f546a46
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_sparc.deb
Size/MD5: 8483442 3562cacfdf57585c037b651be2860162
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_sparc.deb
Size/MD5: 222310 6435f1625def65ad5cb1a9732ae035b4
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_sparc.deb
Size/MD5: 152438 79cc70393fa4b75cac01405f3bdaa830
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_sparc.deb
Size/MD5: 247346 530a4597f2708ddd246845dcd9948eaf
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_sparc.deb
Size/MD5: 727040 f954f2d179c4477caf4ac860dee0a3ee
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.15~prepatch080202a-0ubuntu1_sparc.deb
Size/MD5: 213662 57bd9a62025696c9ac01aeb2c499004a
Updated packages for Ubuntu 6.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+0nobinonly+2-0ubuntu0.6.10.diff.gz
Size/MD5: 321397 4a12ea7d4aff45a651e7169df59b66d1
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+0nobinonly+2-0ubuntu0.6.10.dsc
Size/MD5: 1880 d07152222f3bbbd54702964e6c484e5c
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+0nobinonly+2.orig.tar.gz
Size/MD5: 44800182 38c678dd75c578424a1c18876dd074c4
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_all.deb
Size/MD5: 238002 ac7bdaa151b30f01a44f46e65c8096d8
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_all.deb
Size/MD5: 56822 b9a0587c020e3e1ff251db1da16a3360
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dom-inspector_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_all.deb
Size/MD5: 56922 736209d00ed7a493ad632a595dc3e23e
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-gnome-support_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_all.deb
Size/MD5: 56934 65a72a74cd45970e0fdea2eacf97a19f
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_all.deb
Size/MD5: 57734 08259cf76e7911a1643f9dd34a5946e0
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_amd64.deb
Size/MD5: 50541330 aedaa6323fe786ac93a0361712fe2eef
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_amd64.deb
Size/MD5: 3181304 9de420a7be03b4f2dc7877d51d86641a
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_amd64.deb
Size/MD5: 91280 77851caa28f9541474c579b2fcb58de8
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_amd64.deb
Size/MD5: 10459390 b794e9dca1f5985ac8f2de5e3021d04d
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_amd64.deb
Size/MD5: 226904 e1401fba7056cfed7bfb5c402c773223
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_amd64.deb
Size/MD5: 169286 ef4c54634455afec2b88618fee46b330
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_amd64.deb
Size/MD5: 251926 e8596b001554965f3a84a517c7eabdb7
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_amd64.deb
Size/MD5: 873158 3674842461178bb2118cd634d5ab50a5
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_i386.deb
Size/MD5: 49700122 488b37255f93579b4aa3d091438f0b07
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_i386.deb
Size/MD5: 3171304 e30a5b8ffac759624c9cec382cf076aa
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_i386.deb
Size/MD5: 84944 53061af8afe191476af93f7fd822c879
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_i386.deb
Size/MD5: 9275526 b79a270c10e7b0a53409ee7d2c47a958
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_i386.deb
Size/MD5: 226916 a70250bb5ca1ee549b8fd855ba0aac8b
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_i386.deb
Size/MD5: 158884 6b82381a44eb2d3a7fca63772f299cb0
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_i386.deb
Size/MD5: 251926 1475d73a2829eb9fd9d996b739386152
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_i386.deb
Size/MD5: 795256 e1f9c6278da78da5a15316fcaad8878b
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_powerpc.deb
Size/MD5: 52219576 c0aca4abff7994ed57feedd4b9fad3c6
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_powerpc.deb
Size/MD5: 3178480 51d9d70a821af1b86a0dbe3f1047b695
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_powerpc.deb
Size/MD5: 86810 d20daf80fe21dd441e76544d436b5a97
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_powerpc.deb
Size/MD5: 10120398 d9da66873e77ae9b151806369ea79999
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_powerpc.deb
Size/MD5: 226904 7f5b533329fa758c7119737c3c2932b6
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_powerpc.deb
Size/MD5: 167982 cf663fffe8e0cc731518ad9c2b927353
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_powerpc.deb
Size/MD5: 251958 af430564abd104b1a0d74c6601f9da21
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_powerpc.deb
Size/MD5: 870874 310fadfe6f3678646ddb0eb6905891ae
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_sparc.deb
Size/MD5: 49730348 02a7529d1ce21e8c80c1eacab37d32e9
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_sparc.deb
Size/MD5: 3167800 8540b1e6b3ed43155da0aabe6e9b9646
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_sparc.deb
Size/MD5: 84614 00db1446c0b00efd811f50d924dd5298
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+0nobinonly+2-0ubuntu0.6.10_sparc.deb
Size/MD5: 9546592 3258e1fbd28f510545f4083d1c4286ca
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_sparc.deb
Size/MD5: 226908 ec859ea978ee4faad18198557bd0b93a
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_sparc.deb
Size/MD5: 156870 a08586da831b5189bb86b5613457be8c
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_sparc.deb
Size/MD5: 251942 154e0e0a90641ca61d02229f909c9afe
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.12+0nobinonly+2-0ubuntu0.6.10_sparc.deb
Size/MD5: 777010 15935c9b003f9246bee54b84150c87c1
Updated packages for Ubuntu 7.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+1nobinonly+2-0ubuntu0.7.4.diff.gz
Size/MD5: 314990 26d843966dfcd15d09732da370613437
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+1nobinonly+2-0ubuntu0.7.4.dsc
Size/MD5: 1866 65a8df8593e51c9bd75384019fed4578
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+1nobinonly+2.orig.tar.gz
Size/MD5: 44800182 be1a3be614b123a5f65ef0631cc3ba57
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_all.deb
Size/MD5: 243402 da8caba52c3c82557d4821d770299ecc
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_all.deb
Size/MD5: 58762 45baf9be97557e8b91d2943ca6ba41e6
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dom-inspector_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_all.deb
Size/MD5: 58856 42d6160c4ce8fdb5bf9a37293aa53b1c
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-gnome-support_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_all.deb
Size/MD5: 58870 9dd7670172ef63a5c95a8e0d0b3b2b96
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_all.deb
Size/MD5: 59670 492308cc265c713ffddb255884c4e504
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_amd64.deb
Size/MD5: 50542618 2ca3b30b33b3b999071a16abf8bcd13c
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_amd64.deb
Size/MD5: 3184070 271fa86786f418711a313712877eea98
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_amd64.deb
Size/MD5: 92594 5143ea4adbda306600aee9af86ce77fe
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-libthai_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_amd64.deb
Size/MD5: 62572 a4e2e6b0064c79138f3b2bfa91ac97d1
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_amd64.deb
Size/MD5: 10471176 175a2d6fa77654b739398a2a9d1d03ac
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_amd64.deb
Size/MD5: 228738 30a1385156baa2a9f24b78c129412f18
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_amd64.deb
Size/MD5: 174270 3849519034a0821095cd70f444507d99
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_amd64.deb
Size/MD5: 253900 7b383ef692d89ab55dae43836b2fdd0a
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_amd64.deb
Size/MD5: 880882 8ba385f8afc6037a95707fcb7b23b46d
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_i386.deb
Size/MD5: 49691234 29f617919ad489ca52ee6b81f01c5cbd
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_i386.deb
Size/MD5: 3174990 188a68b01767bc4cca87d3d25337e017
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_i386.deb
Size/MD5: 86790 1e73455e05a6171cc71210f322db025f
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-libthai_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_i386.deb
Size/MD5: 61972 35aeae2f74e57deddf75cc940927b666
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_i386.deb
Size/MD5: 9276348 4801d027bd0a419209a7192eb6b2e5b0
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_i386.deb
Size/MD5: 228752 70786d226354b7dfe928f8a627faf0e9
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_i386.deb
Size/MD5: 163166 9a04fc6540e7b8adf3fb170cadec304d
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_i386.deb
Size/MD5: 253906 fc119126017f04c5b56c3d6f34afdc72
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_i386.deb
Size/MD5: 802282 348a087da1e50abdcc82ab5e540e9f0b
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_powerpc.deb
Size/MD5: 52204680 048216fdda7b51cc351f5282152dae0a
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_powerpc.deb
Size/MD5: 3186926 b6bbe9c19c9f915cff028058a9703485
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_powerpc.deb
Size/MD5: 90636 60db1e12e8d6324c854217356713ed9a
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-libthai_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_powerpc.deb
Size/MD5: 62806 ae3c6db90b09e7343a43bb2d2506776a
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_powerpc.deb
Size/MD5: 10350504 084e73de7223b081b0a34c4f05cd8e5e
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_powerpc.deb
Size/MD5: 228746 a19d7edc4e883b4325a65679a4b53f2b
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_powerpc.deb
Size/MD5: 179910 2ed7a05241f477e018235dadeaa0a180
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_powerpc.deb
Size/MD5: 253906 2d7306a969e66f7ba62020ec9683c5d2
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_powerpc.deb
Size/MD5: 890490 0611974c638cc23f8bb0e64dd5fb1204
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_sparc.deb
Size/MD5: 49727862 0b04e498c69841fba2fb44c0026b9360
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_sparc.deb
Size/MD5: 3173504 a3e8070e87df04e2e1178793a3c28ebb
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_sparc.deb
Size/MD5: 86486 e4e8c5fa9661d7f2883a64c9c913955a
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-libthai_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_sparc.deb
Size/MD5: 62030 b8cba7f28f9ad581adb2952b0cd27778
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+1nobinonly+2-0ubuntu0.7.4_sparc.deb
Size/MD5: 9557480 d914a1f143d06130139ebbaf299a998a
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_sparc.deb
Size/MD5: 228734 0b7a1e9e9c4e8e4dd30faa51715b9b3a
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_sparc.deb
Size/MD5: 161968 6d1e3b53500017050fcd6ad5f797a34c
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_sparc.deb
Size/MD5: 253912 e997d59184566bb92afd170e3d6e16ae
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.12+1nobinonly+2-0ubuntu0.7.4_sparc.deb
Size/MD5: 796038 b7db09f4ad1a2271524d745c807eec0e
Updated packages for Ubuntu 7.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+2nobinonly+2-0ubuntu0.7.10.diff.gz
Size/MD5: 192967 f613f26149f995bb2d90897640751c55
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+2nobinonly+2-0ubuntu0.7.10.dsc
Size/MD5: 1831 10cc37e4a7a8b1ef9913c4336e139e34
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+2nobinonly+2.orig.tar.gz
Size/MD5: 34952512 361be132e02f7583555fdb5909138bdf
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_all.deb
Size/MD5: 200720 e85d0d26bbba30c7cf1acd8539d4ce5d
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_amd64.deb
Size/MD5: 77918994 5e5b6abb9c51f6f991f1270f9fac5c7b
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_amd64.deb
Size/MD5: 3195186 0ea7fd2d7e532bdc5676988b36643cc7
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_amd64.deb
Size/MD5: 98086 ab6e4e54dfb6700e405f5a4004e5f817
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-libthai_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_amd64.deb
Size/MD5: 67082 ff21fe32334e31142459446bf7f7aad7
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_amd64.deb
Size/MD5: 10442880 36de6e6c9f3f34f5eea1b88abce14c6a
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_i386.deb
Size/MD5: 77067198 da3fb93ae70ee78f63495d8ebfe5a356
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_i386.deb
Size/MD5: 3182764 fb3bbf088ecea048f3f163a2ba7aa84d
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_i386.deb
Size/MD5: 91770 4384731b32d52be25ff6e419bf2ec269
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-libthai_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_i386.deb
Size/MD5: 66370 3d301f5fe0766f685ac0cad7766af38b
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_i386.deb
Size/MD5: 9189236 7a8f9a6523ed805b0edb42d9f688fbbc
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_powerpc.deb
Size/MD5: 80531802 0e94eeb3d506799508eb354f7a067b52
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_powerpc.deb
Size/MD5: 3198570 31ca5d436b1510aeb40d98da1e80b6ba
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_powerpc.deb
Size/MD5: 96114 e30b3fc0ee76304c61b36ae059510ba0
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-libthai_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_powerpc.deb
Size/MD5: 67356 6374a01034d982e01e973cd6544f7c5c
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_powerpc.deb
Size/MD5: 10285072 40e7d114d1f2adba2d8be70f40acbfbe
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_sparc.deb
Size/MD5: 77899398 bf815b834944a0a8097c79ae2da6f188
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_sparc.deb
Size/MD5: 3180268 90be06ecf15c876086c03c5910d2e575
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_sparc.deb
Size/MD5: 91548 33215f4ce2e598f29cde37ab518b555e
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-libthai_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_sparc.deb
Size/MD5: 66446 9db9ae28f9b571e27a524f087e8e0f31
http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.12+2nobinonly+2-0ubuntu0.7.10_sparc.deb
Size/MD5: 9436014 697d38db0d9a9d1718fe94aacf3f2abb
.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:048
http://www.mandriva.com/security/
_______________________________________________________________________
Package : mozilla-firefox
Date : February 22, 2008
Affected: 2007.1, 2008.0, Corporate 3.0, Corporate 4.0
_______________________________________________________________________
Problem Description:
A number of security vulnerabilities have been discovered and corrected
in the latest Mozilla Firefox program, version 2.0.0.12.
This update provides the latest Firefox to correct these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594
http://www.mozilla.org/security/announce/2008/mfsa2008-01.html
http://www.mozilla.org/security/announce/2008/mfsa2008-02.html
http://www.mozilla.org/security/announce/2008/mfsa2008-03.html
http://www.mozilla.org/security/announce/2008/mfsa2008-04.html
http://www.mozilla.org/security/announce/2008/mfsa2008-05.html
http://www.mozilla.org/security/announce/2008/mfsa2008-06.html
http://www.mozilla.org/security/announce/2008/mfsa2008-07.html
http://www.mozilla.org/security/announce/2008/mfsa2008-08.html
http://www.mozilla.org/security/announce/2008/mfsa2008-09.html
http://www.mozilla.org/security/announce/2008/mfsa2008-10.html
http://www.mozilla.org/security/announce/2008/mfsa2008-11.html
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.1:
1dc2a51ff44cabe490f34da3faa33c23 2007.1/i586/deskbar-applet-2.18.0-3.6mdv2007.1.i586.rpm
80ddb753b767b007fdcb81a92c0f905b 2007.1/i586/devhelp-0.13-3.6mdv2007.1.i586.rpm
2cad046fa470433fa1e1e3d61a17db64 2007.1/i586/devhelp-plugins-0.13-3.6mdv2007.1.i586.rpm
c77299cbaf51d2c3750463c896a80b1d 2007.1/i586/eclipse-ecj-3.2.2-3.4.4mdv2007.1.i586.rpm
3452bf648a7ac439ae811c4e5fc8a63c 2007.1/i586/eclipse-jdt-3.2.2-3.4.4mdv2007.1.i586.rpm
c52d7efbb414850069093958810d546c 2007.1/i586/eclipse-jdt-sdk-3.2.2-3.4.4mdv2007.1.i586.rpm
9342cf09d7d08ab5f76012ffe9110068 2007.1/i586/eclipse-pde-3.2.2-3.4.4mdv2007.1.i586.rpm
902df90494957eb8cb3dfc65cd79dd3e 2007.1/i586/eclipse-pde-runtime-3.2.2-3.4.4mdv2007.1.i586.rpm
b7921f5695807ed0cbde79f89b022fd6 2007.1/i586/eclipse-pde-sdk-3.2.2-3.4.4mdv2007.1.i586.rpm
e30bda4a05f799ec477adddea26ad2e7 2007.1/i586/eclipse-platform-3.2.2-3.4.4mdv2007.1.i586.rpm
b96010dc64a374151aeedbc08f990939 2007.1/i586/eclipse-platform-sdk-3.2.2-3.4.4mdv2007.1.i586.rpm
7509249502add24a8c879fc07a9045cc 2007.1/i586/eclipse-rcp-3.2.2-3.4.4mdv2007.1.i586.rpm
7b61437abc5b8bcb124d6bffbc00f07c 2007.1/i586/eclipse-rcp-sdk-3.2.2-3.4.4mdv2007.1.i586.rpm
fed3c9c51dfaefaf915f9e7099156d91 2007.1/i586/eclipse-sdk-3.2.2-3.4.4mdv2007.1.i586.rpm
72d3dc507d444eba52b19bd23599ff8e 2007.1/i586/epiphany-2.18.0-5.6mdv2007.1.i586.rpm
c81f9314f3ec6e9d6983f33a3ebd8e94 2007.1/i586/epiphany-devel-2.18.0-5.6mdv2007.1.i586.rpm
92f2517dc7879a37de1c45656c5a3a72 2007.1/i586/epiphany-extensions-2.18.0-2.5mdv2007.1.i586.rpm
d3c955c6add34c6fcf10d96b79d1841a 2007.1/i586/galeon-2.0.3-5.6mdv2007.1.i586.rpm
36f325c6b4ecdc139547e8813f17cd90 2007.1/i586/gnome-python-extras-2.14.3-4.6mdv2007.1.i586.rpm
16d211d490987d4fdfafe820d0e37280 2007.1/i586/gnome-python-gda-2.14.3-4.6mdv2007.1.i586.rpm
784f949debd848dc8b04085d4ed878cb 2007.1/i586/gnome-python-gda-devel-2.14.3-4.6mdv2007.1.i586.rpm
3298cadecd4f531d47c93aaf6c2b61b8 2007.1/i586/gnome-python-gdl-2.14.3-4.6mdv2007.1.i586.rpm
c90b8d88b8516482b9fbb81b962a52e0 2007.1/i586/gnome-python-gksu-2.14.3-4.6mdv2007.1.i586.rpm
aaddc4ccb1380f59a1577d0928950c0d 2007.1/i586/gnome-python-gtkhtml2-2.14.3-4.6mdv2007.1.i586.rpm
31e67c0db16a843c954d18e9040d3924 2007.1/i586/gnome-python-gtkmozembed-2.14.3-4.6mdv2007.1.i586.rpm
fd2a2e1bd9678f78441d7f0388fc50cd 2007.1/i586/gnome-python-gtkspell-2.14.3-4.6mdv2007.1.i586.rpm
2be331921ac0abd4935f2b7e53485558 2007.1/i586/libdevhelp-1_0-0.13-3.6mdv2007.1.i586.rpm
04b8a0a918e5fa4d5d4c9a5ed7ff137f 2007.1/i586/libdevhelp-1_0-devel-0.13-3.6mdv2007.1.i586.rpm
a3782afaa71b91224e3ac035790346f4 2007.1/i586/libmozilla-firefox-devel-2.0.0.12-1.1mdv2007.1.i586.rpm
14cfb1d5f4cf1f065bfca906ff150a4b 2007.1/i586/libmozilla-firefox2.0.0.12-2.0.0.12-1.1mdv2007.1.i586.rpm
c1426c2e93cc901fe35392ff7cb6c685 2007.1/i586/libswt3-gtk2-3.2.2-3.4.4mdv2007.1.i586.rpm
ae1601c5b5f88a7f515284650233983d 2007.1/i586/libtotem-plparser1-2.18.2-1.7mdv2007.1.i586.rpm
c22fc1a859983aa85742e604312f80fa 2007.1/i586/libtotem-plparser1-devel-2.18.2-1.7mdv2007.1.i586.rpm
4eb9fbb0119091748feb9889a3c306a7 2007.1/i586/mozilla-firefox-2.0.0.12-1.1mdv2007.1.i586.rpm
df4485c865ccd7c3242fbe27af182c0d 2007.1/i586/mozilla-firefox-af-2.0.0.12-1mdv2007.1.i586.rpm
3ec20a7b73357ba854ff1cdc1a7cb2b3 2007.1/i586/mozilla-firefox-ar-2.0.0.12-1mdv2007.1.i586.rpm
6fa279489d73c1c4d6a34229d3a153eb 2007.1/i586/mozilla-firefox-be-2.0.0.12-1mdv2007.1.i586.rpm
53bcab0c1e1d67ae7a1a5ac75c5ce494 2007.1/i586/mozilla-firefox-bg-2.0.0.12-1mdv2007.1.i586.rpm
314e0e5ae9425a42b1e439f3396f89f8 2007.1/i586/mozilla-firefox-br_FR-2.0.0.12-1mdv2007.1.i586.rpm
0254a1f48e4ded8678dd112363c29c74 2007.1/i586/mozilla-firefox-ca-2.0.0.12-1mdv2007.1.i586.rpm
e686d9fdd625fc13b3cffa97c5508eb4 2007.1/i586/mozilla-firefox-cs-2.0.0.12-1mdv2007.1.i586.rpm
7ee117f20fe64cadd3e14451719fe7c4 2007.1/i586/mozilla-firefox-da-2.0.0.12-1mdv2007.1.i586.rpm
e7d93e623d8a95f3e6a4e841ecb6dced 2007.1/i586/mozilla-firefox-de-2.0.0.12-1mdv2007.1.i586.rpm
19f90053d81fdc8c1f29f243f042c016 2007.1/i586/mozilla-firefox-el-2.0.0.12-1mdv2007.1.i586.rpm
7ebf410bb0505ca52e0ffb64cd436db1 2007.1/i586/mozilla-firefox-en_GB-2.0.0.12-1mdv2007.1.i586.rpm
c7708420fc247bac083598e09d54abd1 2007.1/i586/mozilla-firefox-es_AR-2.0.0.12-1mdv2007.1.i586.rpm
4bbb4b75f4ce7b2bce3228ee97f83f92 2007.1/i586/mozilla-firefox-es_ES-2.0.0.12-1mdv2007.1.i586.rpm
8a094d00259121d38a34381aef52dc77 2007.1/i586/mozilla-firefox-et_EE-2.0.0.12-1mdv2007.1.i586.rpm
6d7633f405a110a436fe06811a8e2b28 2007.1/i586/mozilla-firefox-eu-2.0.0.12-1mdv2007.1.i586.rpm
00277d0faba3c092d074726f23b479ce 2007.1/i586/mozilla-firefox-fi-2.0.0.12-1mdv2007.1.i586.rpm
a6a7478985d1feb54502161b7bf61de3 2007.1/i586/mozilla-firefox-fr-2.0.0.12-1mdv2007.1.i586.rpm
33fc849c8b3300eb2d93b74e0a21fe9a 2007.1/i586/mozilla-firefox-fy-2.0.0.12-1mdv2007.1.i586.rpm
aeae2cbbc738a25a1024bdd0fa4b3ab3 2007.1/i586/mozilla-firefox-ga-2.0.0.12-1mdv2007.1.i586.rpm
cc28a619f49f76efbb86f80f603078a6 2007.1/i586/mozilla-firefox-gu_IN-2.0.0.12-1mdv2007.1.i586.rpm
9de2102b85eeb76f490abd37c391190a 2007.1/i586/mozilla-firefox-he-2.0.0.12-1mdv2007.1.i586.rpm
e85f6cdb1a60b5a3de9ca2b562660db4 2007.1/i586/mozilla-firefox-hu-2.0.0.12-1mdv2007.1.i586.rpm
3e3c83e797cdbaace62aa33cd55a37ca 2007.1/i586/mozilla-firefox-it-2.0.0.12-1mdv2007.1.i586.rpm
a5a3cc4cf13557ba72885fa57a3ccfa8 2007.1/i586/mozilla-firefox-ja-2.0.0.12-1mdv2007.1.i586.rpm
d39b98fead3b78e7e2f6b03855421bf0 2007.1/i586/mozilla-firefox-ka-2.0.0.12-1mdv2007.1.i586.rpm
1e22b2f9d416fe38a09c5c58ac694b54 2007.1/i586/mozilla-firefox-ko-2.0.0.12-1mdv2007.1.i586.rpm
5c390f65e4992c416fe7ba2719fee970 2007.1/i586/mozilla-firefox-ku-2.0.0.12-1mdv2007.1.i586.rpm
cf66aee1be149bb504491f8a0640f3c1 2007.1/i586/mozilla-firefox-lt-2.0.0.12-1mdv2007.1.i586.rpm
3b347807ab3cfc861833ae72932b7c47 2007.1/i586/mozilla-firefox-mk-2.0.0.12-1mdv2007.1.i586.rpm
d300ac9b315aa0f8ba351e9599871d85 2007.1/i586/mozilla-firefox-mn-2.0.0.12-1mdv2007.1.i586.rpm
5a94beccbed4dbfaaa911e00f75f4ae0 2007.1/i586/mozilla-firefox-nb_NO-2.0.0.12-1mdv2007.1.i586.rpm
6b7f3de774ca6aaec82dd2d4d8898a65 2007.1/i586/mozilla-firefox-nl-2.0.0.12-1mdv2007.1.i586.rpm
3d9f959c201905dd349e5d7df9613fe9 2007.1/i586/mozilla-firefox-nn_NO-2.0.0.12-1mdv2007.1.i586.rpm
d0e6271d86772a36bbeb86d902f186ec 2007.1/i586/mozilla-firefox-pa_IN-2.0.0.12-1mdv2007.1.i586.rpm
1654c8644d33ddfad6877bcc07c7df6e 2007.1/i586/mozilla-firefox-pl-2.0.0.12-1mdv2007.1.i586.rpm
2915c604f7179029fcf46bb7110af6e3 2007.1/i586/mozilla-firefox-pt_BR-2.0.0.12-1mdv2007.1.i586.rpm
70a326e01d4b7dcdcf2098f83d003ea4 2007.1/i586/mozilla-firefox-pt_PT-2.0.0.12-1mdv2007.1.i586.rpm
7c43e07b436e083ba15123c2cd3aa70a 2007.1/i586/mozilla-firefox-ro-2.0.0.12-1mdv2007.1.i586.rpm
d0f26cad526ba1c6e7ac41dbbb34f727 2007.1/i586/mozilla-firefox-ru-2.0.0.12-1mdv2007.1.i586.rpm
0a39286f36e0b5688a293c06de29d8d9 2007.1/i586/mozilla-firefox-sk-2.0.0.12-1mdv2007.1.i586.rpm
2e4dfeab9aa0649f12787519119da6e2 2007.1/i586/mozilla-firefox-sl-2.0.0.12-1mdv2007.1.i586.rpm
c0224a7f560da293f8825d08a5a3ddae 2007.1/i586/mozilla-firefox-sv_SE-2.0.0.12-1mdv2007.1.i586.rpm
39c1a65a74784d086b7756f523a3761e 2007.1/i586/mozilla-firefox-tr-2.0.0.12-1mdv2007.1.i586.rpm
3fb92f19448371ff7b26734df8e46370 2007.1/i586/mozilla-firefox-uk-2.0.0.12-1mdv2007.1.i586.rpm
7e562d06f2fff28067f1cd15f5733af2 2007.1/i586/mozilla-firefox-zh_CN-2.0.0.12-1mdv2007.1.i586.rpm
3098f92ec1c67b2e170fd4ff1730388a 2007.1/i586/mozilla-firefox-zh_TW-2.0.0.12-1mdv2007.1.i586.rpm
1bb36cf0ce6f55517a3473366c494087 2007.1/i586/totem-2.18.2-1.7mdv2007.1.i586.rpm
3be505bd7ca427a7012d496724e94b52 2007.1/i586/totem-common-2.18.2-1.7mdv2007.1.i586.rpm
ae1f2d358274545d78288c02943d68d2 2007.1/i586/totem-gstreamer-2.18.2-1.7mdv2007.1.i586.rpm
a5a82195f23ea5b2adc90368cd7ca1c4 2007.1/i586/totem-mozilla-2.18.2-1.7mdv2007.1.i586.rpm
6eea23a51e4b6c6167d160fd6a283e80 2007.1/i586/totem-mozilla-gstreamer-2.18.2-1.7mdv2007.1.i586.rpm
70b76b7eb83ca3c44b885ebbf545a9e7 2007.1/i586/yelp-2.18.0-3.6mdv2007.1.i586.rpm
22d9b3b7e5698b47fccc3a6357fec6e4 2007.1/SRPMS/deskbar-applet-2.18.0-3.6mdv2007.1.src.rpm
3cf093179a5d711a1532960931d4c069 2007.1/SRPMS/devhelp-0.13-3.6mdv2007.1.src.rpm
824c26cd3bf015fa907e8c870b083297 2007.1/SRPMS/eclipse-3.2.2-3.4.4mdv2007.1.src.rpm
9c3cec104d4eda89c867added6371874 2007.1/SRPMS/epiphany-2.18.0-5.6mdv2007.1.src.rpm
1b6f481d3645ae3d5cb5765a7c456d2a 2007.1/SRPMS/epiphany-extensions-2.18.0-2.5mdv2007.1.src.rpm
759216aff8dc1d14d5de891bc7745d6f 2007.1/SRPMS/galeon-2.0.3-5.6mdv2007.1.src.rpm
3304dc108695e6197e6b30ee03a51a09 2007.1/SRPMS/gnome-python-extras-2.14.3-4.6mdv2007.1.src.rpm
478ad85c7863af6629ac7234debdfbfa 2007.1/SRPMS/mozilla-firefox-2.0.0.12-1.1mdv2007.1.src.rpm
bd76471a2d41c2578b18939415e03b8e 2007.1/SRPMS/mozilla-firefox-l10n-2.0.0.12-1mdv2007.1.src.rpm
9747016f17a8f616419f1b7c4e49dc1f 2007.1/SRPMS/totem-2.18.2-1.7mdv2007.1.src.rpm
f1d428e2757775ec76d83f3be78e6717 2007.1/SRPMS/yelp-2.18.0-3.6mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
691e999c390c5cf9eb7cfa9f7cb36924 2007.1/x86_64/deskbar-applet-2.18.0-3.6mdv2007.1.x86_64.rpm
caa9f1692901e91890216f893c269ff3 2007.1/x86_64/devhelp-0.13-3.6mdv2007.1.x86_64.rpm
05550c4ecdcdf3ae7d888bc0d194a56d 2007.1/x86_64/devhelp-plugins-0.13-3.6mdv2007.1.x86_64.rpm
153b61edcf077ebdfe1f6386bce919d4 2007.1/x86_64/eclipse-ecj-3.2.2-3.4.4mdv2007.1.x86_64.rpm
1ab1d18860b8f590f50f86b0d0fdb681 2007.1/x86_64/eclipse-jdt-3.2.2-3.4.4mdv2007.1.x86_64.rpm
7f59734a966380ae07ee9e120c756d8c 2007.1/x86_64/eclipse-jdt-sdk-3.2.2-3.4.4mdv2007.1.x86_64.rpm
1d0a61206b3302cb3cfe605d61ab7d40 2007.1/x86_64/eclipse-pde-3.2.2-3.4.4mdv2007.1.x86_64.rpm
bb9ba6e6dec65f143c40490f3481570d 2007.1/x86_64/eclipse-pde-runtime-3.2.2-3.4.4mdv2007.1.x86_64.rpm
18c9205dc80f71951461c58379409e71 2007.1/x86_64/eclipse-pde-sdk-3.2.2-3.4.4mdv2007.1.x86_64.rpm
6feda46822a9638d68e0de48c9f29047 2007.1/x86_64/eclipse-platform-3.2.2-3.4.4mdv2007.1.x86_64.rpm
1c32336de45e3ce2ba59af7636cb9fd3 2007.1/x86_64/eclipse-platform-sdk-3.2.2-3.4.4mdv2007.1.x86_64.rpm
d05a8a18748ad28155eb7ae936d2c015 2007.1/x86_64/eclipse-rcp-3.2.2-3.4.4mdv2007.1.x86_64.rpm
8667c57ea4479c6644d1ec77d03f6cc6 2007.1/x86_64/eclipse-rcp-sdk-3.2.2-3.4.4mdv2007.1.x86_64.rpm
cf8bc4f82183b304e20958115202fee5 2007.1/x86_64/eclipse-sdk-3.2.2-3.4.4mdv2007.1.x86_64.rpm
eee890a0b8e76f6509553c9879ac7ecb 2007.1/x86_64/epiphany-2.18.0-5.6mdv2007.1.x86_64.rpm
2dde2d8ddd4c287934b165c4a7119e7f 2007.1/x86_64/epiphany-devel-2.18.0-5.6mdv2007.1.x86_64.rpm
061ec1797d29f4e37ee64cc2826fc39d 2007.1/x86_64/epiphany-extensions-2.18.0-2.5mdv2007.1.x86_64.rpm
bcbaf29656b30c1dcd3fa6d1dc515816 2007.1/x86_64/galeon-2.0.3-5.6mdv2007.1.x86_64.rpm
6ab0f8d7437d253249befd970638e2c7 2007.1/x86_64/gnome-python-extras-2.14.3-4.6mdv2007.1.x86_64.rpm
4397d9794afae4426228e3e8b727f0d5 2007.1/x86_64/gnome-python-gda-2.14.3-4.6mdv2007.1.x86_64.rpm
d44dc156c11bd6da8865f2844e1e8a7d 2007.1/x86_64/gnome-python-gda-devel-2.14.3-4.6mdv2007.1.x86_64.rpm
80e48e7b6320ddd111b3d61f1d55982d 2007.1/x86_64/gnome-python-gdl-2.14.3-4.6mdv2007.1.x86_64.rpm
2273f742d50b47c2554a66d86650b009 2007.1/x86_64/gnome-python-gksu-2.14.3-4.6mdv2007.1.x86_64.rpm
54263146b6cc46aec4a9430fda19b612 2007.1/x86_64/gnome-python-gtkhtml2-2.14.3-4.6mdv2007.1.x86_64.rpm
fa6ad140bec40b0682771394682109c3 2007.1/x86_64/gnome-python-gtkmozembed-2.14.3-4.6mdv2007.1.x86_64.rpm
30bb203d5086759c5f9f1c6f9b6f0dc2 2007.1/x86_64/gnome-python-gtkspell-2.14.3-4.6mdv2007.1.x86_64.rpm
92485911c16bcb95a571558f3622bfd4 2007.1/x86_64/lib64devhelp-1_0-0.13-3.6mdv2007.1.x86_64.rpm
426e40e910923b6c03462d095f1bb94c 2007.1/x86_64/lib64devhelp-1_0-devel-0.13-3.6mdv2007.1.x86_64.rpm
797a51d03672c1eb95bc2d55bd807488 2007.1/x86_64/lib64mozilla-firefox-devel-2.0.0.12-1.1mdv2007.1.x86_64.rpm
414dba6c0d00a4d43437c59f2a8d90f1 2007.1/x86_64/lib64mozilla-firefox2.0.0.12-2.0.0.12-1.1mdv2007.1.x86_64.rpm
e26d4695678e9f68ca749593a1b66f1b 2007.1/x86_64/lib64totem-plparser1-2.18.2-1.7mdv2007.1.x86_64.rpm
8624b056389ff1fe9f33a64cff081e26 2007.1/x86_64/lib64totem-plparser1-devel-2.18.2-1.7mdv2007.1.x86_64.rpm
644e3bd650625950e6b3310b457d5833 2007.1/x86_64/libswt3-gtk2-3.2.2-3.4.4mdv2007.1.x86_64.rpm
a394cb43cf1289cd37f50ec5127a8590 2007.1/x86_64/mozilla-firefox-2.0.0.12-1.1mdv2007.1.x86_64.rpm
c74672f4d61902a3ce298c7f866c52e9 2007.1/x86_64/mozilla-firefox-af-2.0.0.12-1mdv2007.1.x86_64.rpm
12ee1223b0e97842108fe817fe458053 2007.1/x86_64/mozilla-firefox-ar-2.0.0.12-1mdv2007.1.x86_64.rpm
3942350467f9d5799eade58164a34a4e 2007.1/x86_64/mozilla-firefox-be-2.0.0.12-1mdv2007.1.x86_64.rpm
3413e28dec7ed97eee32fb74d6188548 2007.1/x86_64/mozilla-firefox-bg-2.0.0.12-1mdv2007.1.x86_64.rpm
ebd359e9a0af27364e8e4405868a3b3b 2007.1/x86_64/mozilla-firefox-br_FR-2.0.0.12-1mdv2007.1.x86_64.rpm
a08ea8ae48ccb304988a23a561e29e60 2007.1/x86_64/mozilla-firefox-ca-2.0.0.12-1mdv2007.1.x86_64.rpm
147188b2d31441d61466d8c91a9a9462 2007.1/x86_64/mozilla-firefox-cs-2.0.0.12-1mdv2007.1.x86_64.rpm
202afdddc582f8d1f5d94c0aaa0197fd 2007.1/x86_64/mozilla-firefox-da-2.0.0.12-1mdv2007.1.x86_64.rpm
0f3b150c43264b7e3c0c136296390039 2007.1/x86_64/mozilla-firefox-de-2.0.0.12-1mdv2007.1.x86_64.rpm
89e515ffe77b69719efec99a589ce5c1 2007.1/x86_64/mozilla-firefox-el-2.0.0.12-1mdv2007.1.x86_64.rpm
76a281bbd0d3428ebfd593c7eb9f679d 2007.1/x86_64/mozilla-firefox-en_GB-2.0.0.12-1mdv2007.1.x86_64.rpm
e6ac662a04be6997f7d4dbabefe18927 2007.1/x86_64/mozilla-firefox-es_AR-2.0.0.12-1mdv2007.1.x86_64.rpm
8de715af8d0e56385170c247d98ea630 2007.1/x86_64/mozilla-firefox-es_ES-2.0.0.12-1mdv2007.1.x86_64.rpm
abc53ce2f60b1340d1195df5933e7f27 2007.1/x86_64/mozilla-firefox-et_EE-2.0.0.12-1mdv2007.1.x86_64.rpm
8252457050a0027280c413e0105f5853 2007.1/x86_64/mozilla-firefox-eu-2.0.0.12-1mdv2007.1.x86_64.rpm
0465a7b839901eddf832606d39f68be3 2007.1/x86_64/mozilla-firefox-fi-2.0.0.12-1mdv2007.1.x86_64.rpm
9021350fcc01ade20d8ab9b0933959b9 2007.1/x86_64/mozilla-firefox-fr-2.0.0.12-1mdv2007.1.x86_64.rpm
d6a7795dcce490cac731e59989987b30 2007.1/x86_64/mozilla-firefox-fy-2.0.0.12-1mdv2007.1.x86_64.rpm
4c060eb74bc1d46ac492ae671c5507bd 2007.1/x86_64/mozilla-firefox-ga-2.0.0.12-1mdv2007.1.x86_64.rpm
62844d52a90dc6a9c28a454df93e0582 2007.1/x86_64/mozilla-firefox-gu_IN-2.0.0.12-1mdv2007.1.x86_64.rpm
9120e7c5436e0d729dd302f96c979967 2007.1/x86_64/mozilla-firefox-he-2.0.0.12-1mdv2007.1.x86_64.rpm
337d8a3ddc147972b8137d25dd884c37 2007.1/x86_64/mozilla-firefox-hu-2.0.0.12-1mdv2007.1.x86_64.rpm
3c93704f70f2b328228c773f57f94275 2007.1/x86_64/mozilla-firefox-it-2.0.0.12-1mdv2007.1.x86_64.rpm
ccc3536e636482c5cc78b9fd255b7f46 2007.1/x86_64/mozilla-firefox-ja-2.0.0.12-1mdv2007.1.x86_64.rpm
5a5e4c41bd5069a93a535664255d452d 2007.1/x86_64/mozilla-firefox-ka-2.0.0.12-1mdv2007.1.x86_64.rpm
45a443556cb2e1bf89ba8400b9853ed6 2007.1/x86_64/mozilla-firefox-ko-2.0.0.12-1mdv2007.1.x86_64.rpm
6b8837513ae819d26f5dfe8b965f2e64 2007.1/x86_64/mozilla-firefox-ku-2.0.0.12-1mdv2007.1.x86_64.rpm
b8f56a62ca7c5148e046915b7b06f3dd 2007.1/x86_64/mozilla-firefox-lt-2.0.0.12-1mdv2007.1.x86_64.rpm
3dc8413b89cc07e3a28e954bddf76a6d 2007.1/x86_64/mozilla-firefox-mk-2.0.0.12-1mdv2007.1.x86_64.rpm
4b16b86e7c13acfbe81a23f1075b8c79 2007.1/x86_64/mozilla-firefox-mn-2.0.0.12-1mdv2007.1.x86_64.rpm
95c62278ac3eb8ec53302f9b07622358 2007.1/x86_64/mozilla-firefox-nb_NO-2.0.0.12-1mdv2007.1.x86_64.rpm
61f0aeb307a99a9dcd14505a4c37bcee 2007.1/x86_64/mozilla-firefox-nl-2.0.0.12-1mdv2007.1.x86_64.rpm
974cc15e998b6a0da384f7da17795041 2007.1/x86_64/mozilla-firefox-nn_NO-2.0.0.12-1mdv2007.1.x86_64.rpm
15ba737cf9ced004ce71550ab3d9876b 2007.1/x86_64/mozilla-firefox-pa_IN-2.0.0.12-1mdv2007.1.x86_64.rpm
664f9a441cd31d92783ddc48e537ce4e 2007.1/x86_64/mozilla-firefox-pl-2.0.0.12-1mdv2007.1.x86_64.rpm
d839b414d813ff733637121d5dfc9597 2007.1/x86_64/mozilla-firefox-pt_BR-2.0.0.12-1mdv2007.1.x86_64.rpm
cc322abde304375cb3593656f439dd4a 2007.1/x86_64/mozilla-firefox-pt_PT-2.0.0.12-1mdv2007.1.x86_64.rpm
03ee8f92667603edc0dfbd3d25d98a91 2007.1/x86_64/mozilla-firefox-ro-2.0.0.12-1mdv2007.1.x86_64.rpm
f0d1391e46f5ba33ae6b46f96afcbb62 2007.1/x86_64/mozilla-firefox-ru-2.0.0.12-1mdv2007.1.x86_64.rpm
2373c8b353b75a989409c95c8a3376b0 2007.1/x86_64/mozilla-firefox-sk-2.0.0.12-1mdv2007.1.x86_64.rpm
5a4e7d321490dbdae8f0d1c391033cf4 2007.1/x86_64/mozilla-firefox-sl-2.0.0.12-1mdv2007.1.x86_64.rpm
6e30e25e08cd23fa9783800aaeb17d38 2007.1/x86_64/mozilla-firefox-sv_SE-2.0.0.12-1mdv2007.1.x86_64.rpm
47f3e27f3e000924f81404f3cda222cc 2007.1/x86_64/mozilla-firefox-tr-2.0.0.12-1mdv2007.1.x86_64.rpm
2e843cc9a0ad5527f097840b3482e93d 2007.1/x86_64/mozilla-firefox-uk-2.0.0.12-1mdv2007.1.x86_64.rpm
d6d560ef65a33e06222417ca0f25a69d 2007.1/x86_64/mozilla-firefox-zh_CN-2.0.0.12-1mdv2007.1.x86_64.rpm
6f023284f94e59d9a3a555147423c2fa 2007.1/x86_64/mozilla-firefox-zh_TW-2.0.0.12-1mdv2007.1.x86_64.rpm
9c244429f79868294786d3edb88b630d 2007.1/x86_64/totem-2.18.2-1.7mdv2007.1.x86_64.rpm
0839e08ff2af223b6ba3d80670af7961 2007.1/x86_64/totem-common-2.18.2-1.7mdv2007.1.x86_64.rpm
de037eb59adf51a7d8dafbe1b65f01cd 2007.1/x86_64/totem-gstreamer-2.18.2-1.7mdv2007.1.x86_64.rpm
968247765ff758ddd93d38020604957d 2007.1/x86_64/totem-mozilla-2.18.2-1.7mdv2007.1.x86_64.rpm
40d3cb387ecf9f50e549065690b6577f 2007.1/x86_64/totem-mozilla-gstreamer-2.18.2-1.7mdv2007.1.x86_64.rpm
2b5ffacf78cf59f0d5bcd748c6cfc3b9 2007.1/x86_64/yelp-2.18.0-3.6mdv2007.1.x86_64.rpm
22d9b3b7e5698b47fccc3a6357fec6e4 2007.1/SRPMS/deskbar-applet-2.18.0-3.6mdv2007.1.src.rpm
3cf093179a5d711a1532960931d4c069 2007.1/SRPMS/devhelp-0.13-3.6mdv2007.1.src.rpm
824c26cd3bf015fa907e8c870b083297 2007.1/SRPMS/eclipse-3.2.2-3.4.4mdv2007.1.src.rpm
9c3cec104d4eda89c867added6371874 2007.1/SRPMS/epiphany-2.18.0-5.6mdv2007.1.src.rpm
1b6f481d3645ae3d5cb5765a7c456d2a 2007.1/SRPMS/epiphany-extensions-2.18.0-2.5mdv2007.1.src.rpm
759216aff8dc1d14d5de891bc7745d6f 2007.1/SRPMS/galeon-2.0.3-5.6mdv2007.1.src.rpm
3304dc108695e6197e6b30ee03a51a09 2007.1/SRPMS/gnome-python-extras-2.14.3-4.6mdv2007.1.src.rpm
478ad85c7863af6629ac7234debdfbfa 2007.1/SRPMS/mozilla-firefox-2.0.0.12-1.1mdv2007.1.src.rpm
bd76471a2d41c2578b18939415e03b8e 2007.1/SRPMS/mozilla-firefox-l10n-2.0.0.12-1mdv2007.1.src.rpm
9747016f17a8f616419f1b7c4e49dc1f 2007.1/SRPMS/totem-2.18.2-1.7mdv2007.1.src.rpm
f1d428e2757775ec76d83f3be78e6717 2007.1/SRPMS/yelp-2.18.0-3.6mdv2007.1.src.rpm
Mandriva Linux 2008.0:
b9ed3ce884f9bdc1bbc2ca45a69b49e9 2008.0/i586/devhelp-0.16-1.3mdv2008.0.i586.rpm
ed2da3bc8550f42d071afe5cd5dcb626 2008.0/i586/devhelp-plugins-0.16-1.3mdv2008.0.i586.rpm
278b937377cab903ac69490711a8b928 2008.0/i586/eclipse-cvs-client-3.3.0-0.20.8.3mdv2008.0.i586.rpm
22d6fc428c6c1439da9b193de7f8bc13 2008.0/i586/eclipse-ecj-3.3.0-0.20.8.3mdv2008.0.i586.rpm
4cbee48cb9289a3275010e378c2156f5 2008.0/i586/eclipse-jdt-3.3.0-0.20.8.3mdv2008.0.i586.rpm
1d1d9fc56fbdf18e78c6ff5db0238758 2008.0/i586/eclipse-pde-3.3.0-0.20.8.3mdv2008.0.i586.rpm
5307ccd1f83a046923b488b2f939152c 2008.0/i586/eclipse-pde-runtime-3.3.0-0.20.8.3mdv2008.0.i586.rpm
f7ec4b95c23f2b879ac5c1d807076429 2008.0/i586/eclipse-platform-3.3.0-0.20.8.3mdv2008.0.i586.rpm
6c03f1c0a1282323c29ecdd41124ec69 2008.0/i586/eclipse-rcp-3.3.0-0.20.8.3mdv2008.0.i586.rpm
298103c5cd25124cf033dc4306c9c9f5 2008.0/i586/epiphany-2.20.0-1.3mdv2008.0.i586.rpm
62dffadf7d2352111917c4c344aaba65 2008.0/i586/epiphany-devel-2.20.0-1.3mdv2008.0.i586.rpm
2f24d71af446fb3368c06791f0df09d0 2008.0/i586/galeon-2.0.3-7.3mdv2008.0.i586.rpm
e722fe502740262bfd86f1d56baad8b4 2008.0/i586/gnome-python-extras-2.19.1-4.3mdv2008.0.i586.rpm
7fa422ad5d8fc5a22f18e1344de6a52e 2008.0/i586/gnome-python-gda-2.19.1-4.3mdv2008.0.i586.rpm
01b3b75cd0f61b6cede729ad0ce7049e 2008.0/i586/gnome-python-gda-devel-2.19.1-4.3mdv2008.0.i586.rpm
b027bdacb4c54794a39941ed57eae603 2008.0/i586/gnome-python-gdl-2.19.1-4.3mdv2008.0.i586.rpm
f03b3364360771482c3787e07eec7cb1 2008.0/i586/gnome-python-gksu-2.19.1-4.3mdv2008.0.i586.rpm
61b7e3bf96718d1b3f69c7975aa50304 2008.0/i586/gnome-python-gtkhtml2-2.19.1-4.3mdv2008.0.i586.rpm
1b3e7d7f72f8e6c7538ff1dc64f26e8c 2008.0/i586/gnome-python-gtkmozembed-2.19.1-4.3mdv2008.0.i586.rpm
d02af7b90406fac43092c2081680d710 2008.0/i586/gnome-python-gtkspell-2.19.1-4.3mdv2008.0.i586.rpm
4ccf8f36d0458a428e9fb2345e94cfc2 2008.0/i586/libdevhelp-1-devel-0.16-1.3mdv2008.0.i586.rpm
d02dc201a45281fcd871f84daa80564f 2008.0/i586/libdevhelp-1_0-0.16-1.3mdv2008.0.i586.rpm
4a6927720465de3b79a3497f2a578c2b 2008.0/i586/libmozilla-firefox-devel-2.0.0.12-1.1mdv2008.0.i586.rpm
844ea6862f575229557ce2f8a058432b 2008.0/i586/libmozilla-firefox2.0.0.12-2.0.0.12-1.1mdv2008.0.i586.rpm
f450a3638c675dc92ff2ef0a685d11ee 2008.0/i586/libswt3-gtk2-3.3.0-0.20.8.3mdv2008.0.i586.rpm
445b0e3b0a8d3a078307938e72e2b78d 2008.0/i586/libtotem-plparser-devel-2.20.1-1.2mdv2008.0.i586.rpm
3a3c057314238103a36115fa71bb637f 2008.0/i586/libtotem-plparser7-2.20.1-1.2mdv2008.0.i586.rpm
d56467de0ac9ea808080b0605909366e 2008.0/i586/mozilla-firefox-2.0.0.12-1.1mdv2008.0.i586.rpm
0711c8212df759437a176f8525560e6e 2008.0/i586/mozilla-firefox-af-2.0.0.12-1mdv2008.0.i586.rpm
15f1e548b0d2198742f4d358ad796a42 2008.0/i586/mozilla-firefox-ar-2.0.0.12-1mdv2008.0.i586.rpm
82fa5aea23785a60616c68a8ef7e5932 2008.0/i586/mozilla-firefox-be-2.0.0.12-1mdv2008.0.i586.rpm
96385f21854f261d354406257ae25362 2008.0/i586/mozilla-firefox-bg-2.0.0.12-1mdv2008.0.i586.rpm
a148aa83b35eb670fedf19c80c0876a3 2008.0/i586/mozilla-firefox-br_FR-2.0.0.12-1mdv2008.0.i586.rpm
ddb1086ba8de9dcea6fa3e561a2a7310 2008.0/i586/mozilla-firefox-ca-2.0.0.12-1mdv2008.0.i586.rpm
2023098fa5017553eddd2d780acc096f 2008.0/i586/mozilla-firefox-cs-2.0.0.12-1mdv2008.0.i586.rpm
60dab666392dc1b2e0ae9ba3d4be008b 2008.0/i586/mozilla-firefox-da-2.0.0.12-1mdv2008.0.i586.rpm
b12a81d439f33c9f7b247e91500b2146 2008.0/i586/mozilla-firefox-de-2.0.0.12-1mdv2008.0.i586.rpm
e41c11cf94981c0b7b3df390da495bc0 2008.0/i586/mozilla-firefox-el-2.0.0.12-1mdv2008.0.i586.rpm
569922ef1cf787bb1a695a63775d1389 2008.0/i586/mozilla-firefox-en_GB-2.0.0.12-1mdv2008.0.i586.rpm
c5efdffee339eaf9d34bace8942888b4 2008.0/i586/mozilla-firefox-es_AR-2.0.0.12-1mdv2008.0.i586.rpm
d151770d576f08c9204b13b3ea1559d9 2008.0/i586/mozilla-firefox-es_ES-2.0.0.12-1mdv2008.0.i586.rpm
946886a35d058f30de178938496ebe96 2008.0/i586/mozilla-firefox-et_EE-2.0.0.12-1mdv2008.0.i586.rpm
949d8575e900c1df357f2e9eef7a32ca 2008.0/i586/mozilla-firefox-eu-2.0.0.12-1mdv2008.0.i586.rpm
6f06703f8ee7d7ebfaa951eb9b935397 2008.0/i586/mozilla-firefox-ext-blogrovr-1.1.771-1.1mdv2008.0.i586.rpm
1a67631467fd5cdcd1fd63cd55807c0c 2008.0/i586/mozilla-firefox-ext-foxmarks-2.0.43-1mdv2008.0.i586.rpm
145d0c6bf0e6d5bacbdf63471844d3a7 2008.0/i586/mozilla-firefox-ext-scribefire-1.4.2-4.1mdv2008.0.i586.rpm
2e24c0bf13b81aef0524988a48c86c85 2008.0/i586/mozilla-firefox-fi-2.0.0.12-1mdv2008.0.i586.rpm
bf859aba5985cd4f8de5d77097ce27ab 2008.0/i586/mozilla-firefox-fr-2.0.0.12-1mdv2008.0.i586.rpm
1e419bb831898aa7f7f280b101e33163 2008.0/i586/mozilla-firefox-fy-2.0.0.12-1mdv2008.0.i586.rpm
7e6411d52ce2a968274410514ca319d3 2008.0/i586/mozilla-firefox-ga-2.0.0.12-1mdv2008.0.i586.rpm
60cb492b459d4fc3fc076b8ac90013e8 2008.0/i586/mozilla-firefox-gnome-support-2.0.0.12-1.1mdv2008.0.i586.rpm
34cf05391500b866f1b0b4776046ab3f 2008.0/i586/mozilla-firefox-gu_IN-2.0.0.12-1mdv2008.0.i586.rpm
9b2954bd04ecc285f2535a828432d0df 2008.0/i586/mozilla-firefox-he-2.0.0.12-1mdv2008.0.i586.rpm
2356729d9b2e4b532838c7913ba30637 2008.0/i586/mozilla-firefox-hu-2.0.0.12-1mdv2008.0.i586.rpm
d213db926f0959643649708ed4c4af61 2008.0/i586/mozilla-firefox-it-2.0.0.12-1mdv2008.0.i586.rpm
352161c8c2aa1943e791cc58f0e3c785 2008.0/i586/mozilla-firefox-ja-2.0.0.12-1mdv2008.0.i586.rpm
72465fe9a44aeeb74a6cfd412f9e708b 2008.0/i586/mozilla-firefox-ka-2.0.0.12-1mdv2008.0.i586.rpm
445861082658f826f76f01c8f48ce040 2008.0/i586/mozilla-firefox-ko-2.0.0.12-1mdv2008.0.i586.rpm
b33adecf186e8301cd292075a699eef0 2008.0/i586/mozilla-firefox-ku-2.0.0.12-1mdv2008.0.i586.rpm
878a44794064d86bbc3a511fc9f94d1e 2008.0/i586/mozilla-firefox-lt-2.0.0.12-1mdv2008.0.i586.rpm
05bdf7d1f1d304f8e1e6aa2e990bd764 2008.0/i586/mozilla-firefox-mk-2.0.0.12-1mdv2008.0.i586.rpm
b32ae7f6ad74c87d2efed37df2150967 2008.0/i586/mozilla-firefox-mn-2.0.0.12-1mdv2008.0.i586.rpm
8fdeb19e609e8334379bd7b13d88fcb6 2008.0/i586/mozilla-firefox-nb_NO-2.0.0.12-1mdv2008.0.i586.rpm
4e3f6d3a1030791d16855755489fead0 2008.0/i586/mozilla-firefox-nl-2.0.0.12-1mdv2008.0.i586.rpm
71d850481e225951fb6ed40501976174 2008.0/i586/mozilla-firefox-nn_NO-2.0.0.12-1mdv2008.0.i586.rpm
8d5bb6c37b32575fc34c4334be6e1842 2008.0/i586/mozilla-firefox-pa_IN-2.0.0.12-1mdv2008.0.i586.rpm
848747d8c1a6b48808a7f7c6148e1d26 2008.0/i586/mozilla-firefox-pl-2.0.0.12-1mdv2008.0.i586.rpm
e1beba530c98af86e02164a948fcf08b 2008.0/i586/mozilla-firefox-pt_BR-2.0.0.12-1mdv2008.0.i586.rpm
3a9d3ef361497ee878f1f970a1916e2d 2008.0/i586/mozilla-firefox-pt_PT-2.0.0.12-1mdv2008.0.i586.rpm
994a4e5470f23522b3188de86b405edb 2008.0/i586/mozilla-firefox-ro-2.0.0.12-1mdv2008.0.i586.rpm
0862286c72978f7ed8ae34be4e0f3e4e 2008.0/i586/mozilla-firefox-ru-2.0.0.12-1mdv2008.0.i586.rpm
455ecd10092e5bec3904e72426cb7d17 2008.0/i586/mozilla-firefox-sk-2.0.0.12-1mdv2008.0.i586.rpm
49ea3406aeec377bf84d74e5407a9f9e 2008.0/i586/mozilla-firefox-sl-2.0.0.12-1mdv2008.0.i586.rpm
4e6074968ddd1ae114d3041c4742643d 2008.0/i586/mozilla-firefox-sv_SE-2.0.0.12-1mdv2008.0.i586.rpm
117e43ed744cf4363ccf9b7de9db90da 2008.0/i586/mozilla-firefox-tr-2.0.0.12-1mdv2008.0.i586.rpm
f4b7a624f8b7cd2c91c1a3a5c82c4c86 2008.0/i586/mozilla-firefox-uk-2.0.0.12-1mdv2008.0.i586.rpm
e023caab47e5409ae7892144b4603139 2008.0/i586/mozilla-firefox-zh_CN-2.0.0.12-1mdv2008.0.i586.rpm
bfce9fb35e295b3aab1937a5930f94cd 2008.0/i586/mozilla-firefox-zh_TW-2.0.0.12-1mdv2008.0.i586.rpm
3faf9dcb53903cfc255c8a83b441376d 2008.0/i586/totem-2.20.1-1.2mdv2008.0.i586.rpm
37614ee5b5d3e141573e5d17d142d419 2008.0/i586/totem-common-2.20.1-1.2mdv2008.0.i586.rpm
5d894ec0e4e9695b5c45897be5a3fe41 2008.0/i586/totem-gstreamer-2.20.1-1.2mdv2008.0.i586.rpm
bdda2275535580a00d87374804d8356a 2008.0/i586/totem-mozilla-2.20.1-1.2mdv2008.0.i586.rpm
b5b144ef52b3d0c79cfea70098e593ee 2008.0/i586/totem-mozilla-gstreamer-2.20.1-1.2mdv2008.0.i586.rpm
131b7e638a900ef5483b238760b3ce7e 2008.0/i586/yelp-2.20.0-3.2mdv2008.0.i586.rpm
fd64f784036f9a7a67ae7dc4bc840755 2008.0/SRPMS/devhelp-0.16-1.3mdv2008.0.src.rpm
483a9c4d9ae531f9b3586d3a2da2f8a2 2008.0/SRPMS/eclipse-3.3.0-0.20.8.3mdv2008.0.src.rpm
331b129d4ea2db89884b6531a8a7f58b 2008.0/SRPMS/epiphany-2.20.0-1.3mdv2008.0.src.rpm
3c7ab32d75b68e67a68b1933aa477fa9 2008.0/SRPMS/galeon-2.0.3-7.3mdv2008.0.src.rpm
4f71054efcad5f6ea4a41d3f003fd909 2008.0/SRPMS/gnome-python-extras-2.19.1-4.3mdv2008.0.src.rpm
64ec454e2292e0f3d39d1c3b23407957 2008.0/SRPMS/mozilla-firefox-2.0.0.12-1.1mdv2008.0.src.rpm
b0f611d44d02a710ed8d868d745cca25 2008.0/SRPMS/mozilla-firefox-ext-blogrovr-1.1.771-1.1mdv2008.0.src.rpm
344da985922776256af6accfba04672a 2008.0/SRPMS/mozilla-firefox-ext-foxmarks-2.0.43-1mdv2008.0.src.rpm
eb8583166df4ad6591d184af922824c3 2008.0/SRPMS/mozilla-firefox-ext-scribefire-1.4.2-4.1mdv2008.0.src.rpm
9c9ca299024b58a8c292c723724e4aa8 2008.0/SRPMS/mozilla-firefox-l10n-2.0.0.12-1mdv2008.0.src.rpm
db53f00eaa8cc296f6cd1109fe45cc69 2008.0/SRPMS/totem-2.20.1-1.2mdv2008.0.src.rpm
4429b4db2e0c4d1f27abccc8e140023e 2008.0/SRPMS/yelp-2.20.0-3.2mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
7637b945a5a1d92d319929e6116fff90 2008.0/x86_64/devhelp-0.16-1.3mdv2008.0.x86_64.rpm
e90b3b646f35eeb9ab56d5709139e44e 2008.0/x86_64/devhelp-plugins-0.16-1.3mdv2008.0.x86_64.rpm
f637d11794273584bab7709f72a93bc8 2008.0/x86_64/eclipse-cvs-client-3.3.0-0.20.8.3mdv2008.0.x86_64.rpm
90d38b352269c8cd1830752e68222146 2008.0/x86_64/eclipse-ecj-3.3.0-0.20.8.3mdv2008.0.x86_64.rpm
d9f6e45888de01e795f5d31fcc609d34 2008.0/x86_64/eclipse-jdt-3.3.0-0.20.8.3mdv2008.0.x86_64.rpm
8f2014eedbc9549489aaa9d3ccac141f 2008.0/x86_64/eclipse-pde-3.3.0-0.20.8.3mdv2008.0.x86_64.rpm
52268ee1aee89cc1fbbc39b9a49fa4a3 2008.0/x86_64/eclipse-pde-runtime-3.3.0-0.20.8.3mdv2008.0.x86_64.rpm
e51c76c8f9304dd47e24e84954d2bad7 2008.0/x86_64/eclipse-platform-3.3.0-0.20.8.3mdv2008.0.x86_64.rpm
f6d7a18638cf2264d90b82804dee0605 2008.0/x86_64/eclipse-rcp-3.3.0-0.20.8.3mdv2008.0.x86_64.rpm
2b14100415d56d45fd66a1038c03bc41 2008.0/x86_64/epiphany-2.20.0-1.3mdv2008.0.x86_64.rpm
18cec3625191d15787b77819c97992e0 2008.0/x86_64/epiphany-devel-2.20.0-1.3mdv2008.0.x86_64.rpm
672f2b365918d0d562a57451761f7175 2008.0/x86_64/galeon-2.0.3-7.3mdv2008.0.x86_64.rpm
620bcafdf53e73c4619c5a346c70a531 2008.0/x86_64/gnome-python-extras-2.19.1-4.3mdv2008.0.x86_64.rpm
1f954e8583d479e1921ec39e2842ed65 2008.0/x86_64/gnome-python-gda-2.19.1-4.3mdv2008.0.x86_64.rpm
d2b51bd56abca2be983d4d54c741f6fd 2008.0/x86_64/gnome-python-gda-devel-2.19.1-4.3mdv2008.0.x86_64.rpm
e5b9d75c878c43be0de65617a5c62dd8 2008.0/x86_64/gnome-python-gdl-2.19.1-4.3mdv2008.0.x86_64.rpm
c39535f16de1822b3afcbafb38cdd067 2008.0/x86_64/gnome-python-gksu-2.19.1-4.3mdv2008.0.x86_64.rpm
982509689a28dbc301c3f65278639ec8 2008.0/x86_64/gnome-python-gtkhtml2-2.19.1-4.3mdv2008.0.x86_64.rpm
7e324bc741e70a3b560ac7657d36b424 2008.0/x86_64/gnome-python-gtkmozembed-2.19.1-4.3mdv2008.0.x86_64.rpm
9acc6d3c83cdb74954a281dc62899599 2008.0/x86_64/gnome-python-gtkspell-2.19.1-4.3mdv2008.0.x86_64.rpm
fca20482c9fa5c36cc70ea4dbee013cf 2008.0/x86_64/lib64devhelp-1-devel-0.16-1.3mdv2008.0.x86_64.rpm
230116bc2d8c100fa6e79c751e8849e8 2008.0/x86_64/lib64devhelp-1_0-0.16-1.3mdv2008.0.x86_64.rpm
a99787473640413505d74dd9af737c33 2008.0/x86_64/lib64mozilla-firefox-devel-2.0.0.12-1.1mdv2008.0.x86_64.rpm
7765387decd77b6cd678ba97a80aa212 2008.0/x86_64/lib64mozilla-firefox2.0.0.12-2.0.0.12-1.1mdv2008.0.x86_64.rpm
f771f31ce21856d297af6b314e73bd6f 2008.0/x86_64/lib64totem-plparser-devel-2.20.1-1.2mdv2008.0.x86_64.rpm
8165c641a39c30be4147cbb006e6ce59 2008.0/x86_64/lib64totem-plparser7-2.20.1-1.2mdv2008.0.x86_64.rpm
f9d8ede28ccc73d9c4e1eb42c3b529dd 2008.0/x86_64/libswt3-gtk2-3.3.0-0.20.8.3mdv2008.0.x86_64.rpm
a2a62a67abf56f791fe8867de18c3d9f 2008.0/x86_64/mozilla-firefox-2.0.0.12-1.1mdv2008.0.x86_64.rpm
ca37b76d4c340aa31f696f7539e0ea33 2008.0/x86_64/mozilla-firefox-af-2.0.0.12-1mdv2008.0.x86_64.rpm
03bba40715b886951b4809058c61446a 2008.0/x86_64/mozilla-firefox-ar-2.0.0.12-1mdv2008.0.x86_64.rpm
b6ce56c92082b2e329941af2a48007f7 2008.0/x86_64/mozilla-firefox-be-2.0.0.12-1mdv2008.0.x86_64.rpm
d9fb339dc9374c58b5652d71f2a90454 2008.0/x86_64/mozilla-firefox-bg-2.0.0.12-1mdv2008.0.x86_64.rpm
ecb686040cfcc1741b0a328576214340 2008.0/x86_64/mozilla-firefox-br_FR-2.0.0.12-1mdv2008.0.x86_64.rpm
0554cc5ff06d136da6eb7e02d039eba2 2008.0/x86_64/mozilla-firefox-ca-2.0.0.12-1mdv2008.0.x86_64.rpm
faf68eb0c9a52a58d98290b74c98d7a0 2008.0/x86_64/mozilla-firefox-cs-2.0.0.12-1mdv2008.0.x86_64.rpm
105febad3e8a142f1b5741e53b7623b7 2008.0/x86_64/mozilla-firefox-da-2.0.0.12-1mdv2008.0.x86_64.rpm
a09f4b5117c11ca7415e0987471b3198 2008.0/x86_64/mozilla-firefox-de-2.0.0.12-1mdv2008.0.x86_64.rpm
9a4c5ebcb8fa0fd83f9b1b0448f74ff7 2008.0/x86_64/mozilla-firefox-el-2.0.0.12-1mdv2008.0.x86_64.rpm
e3d73c78cfd7f50aaaa0c7c50ae26133 2008.0/x86_64/mozilla-firefox-en_GB-2.0.0.12-1mdv2008.0.x86_64.rpm
733628c57cf6a1165db3ba8cfda4632f 2008.0/x86_64/mozilla-firefox-es_AR-2.0.0.12-1mdv2008.0.x86_64.rpm
2af0226fcdae799c8e4d9844fba5a060 2008.0/x86_64/mozilla-firefox-es_ES-2.0.0.12-1mdv2008.0.x86_64.rpm
67144ddc8c9226bdbcbaa9d9255e02b3 2008.0/x86_64/mozilla-firefox-et_EE-2.0.0.12-1mdv2008.0.x86_64.rpm
92888bed6a4187ee27af85da7a96aba9 2008.0/x86_64/mozilla-firefox-eu-2.0.0.12-1mdv2008.0.x86_64.rpm
6eaa41c4a0bdde8f016beb06e719e57c 2008.0/x86_64/mozilla-firefox-ext-blogrovr-1.1.771-1.1mdv2008.0.x86_64.rpm
f1453161a26e650c4172bf7a69dc2f52 2008.0/x86_64/mozilla-firefox-ext-foxmarks-2.0.43-1mdv2008.0.x86_64.rpm
3a7cbb41c223cc1eb64e70011a50a92e 2008.0/x86_64/mozilla-firefox-ext-scribefire-1.4.2-4.1mdv2008.0.x86_64.rpm
7d4987023db30662237b2dff17673112 2008.0/x86_64/mozilla-firefox-fi-2.0.0.12-1mdv2008.0.x86_64.rpm
665624041067cb596d20ac0fae0c56e1 2008.0/x86_64/mozilla-firefox-fr-2.0.0.12-1mdv2008.0.x86_64.rpm
e371bf004aee3199dae4818f156cc2a8 2008.0/x86_64/mozilla-firefox-fy-2.0.0.12-1mdv2008.0.x86_64.rpm
8187e9e50111404689936a361edcb9e0 2008.0/x86_64/mozilla-firefox-ga-2.0.0.12-1mdv2008.0.x86_64.rpm
b59b0c7598a9ff58d266ef445b60a6ea 2008.0/x86_64/mozilla-firefox-gnome-support-2.0.0.12-1.1mdv2008.0.x86_64.rpm
3da5205396822b8e7ddd189c9dede8db 2008.0/x86_64/mozilla-firefox-gu_IN-2.0.0.12-1mdv2008.0.x86_64.rpm
b6540fa0265f001e1ec7ea34c8d62964 2008.0/x86_64/mozilla-firefox-he-2.0.0.12-1mdv2008.0.x86_64.rpm
2ee06f3b7c50e7556f9495fbd72e2400 2008.0/x86_64/mozilla-firefox-hu-2.0.0.12-1mdv2008.0.x86_64.rpm
1293fc5f1ecfd8f73ee14ce4cd38d89b 2008.0/x86_64/mozilla-firefox-it-2.0.0.12-1mdv2008.0.x86_64.rpm
0bb358710509fd6e3d62eb8d89fd8277 2008.0/x86_64/mozilla-firefox-ja-2.0.0.12-1mdv2008.0.x86_64.rpm
f55afc6e06b1b1ffb81bb509fe1790c9 2008.0/x86_64/mozilla-firefox-ka-2.0.0.12-1mdv2008.0.x86_64.rpm
12f6237676be8832af1acf05ff64ebb2 2008.0/x86_64/mozilla-firefox-ko-2.0.0.12-1mdv2008.0.x86_64.rpm
12716873fa7cefc1ec056bdd82ae0667 2008.0/x86_64/mozilla-firefox-ku-2.0.0.12-1mdv2008.0.x86_64.rpm
dd794d67a43611fc29e34c068ee775d3 2008.0/x86_64/mozilla-firefox-lt-2.0.0.12-1mdv2008.0.x86_64.rpm
40d0a5fcf19888cb0de6ff20a00b2a2c 2008.0/x86_64/mozilla-firefox-mk-2.0.0.12-1mdv2008.0.x86_64.rpm
b240c1bcd60d2555c06134b166b356fa 2008.0/x86_64/mozilla-firefox-mn-2.0.0.12-1mdv2008.0.x86_64.rpm
ce6bee8f71969e259e66fc5ccd72f668 2008.0/x86_64/mozilla-firefox-nb_NO-2.0.0.12-1mdv2008.0.x86_64.rpm
f4620fd14b954c78709fcc01708f6053 2008.0/x86_64/mozilla-firefox-nl-2.0.0.12-1mdv2008.0.x86_64.rpm
e7a51c8d25fc46637845172a96a7366d 2008.0/x86_64/mozilla-firefox-nn_NO-2.0.0.12-1mdv2008.0.x86_64.rpm
cbd80830cf912bd3f0eb4b5e73de7c9b 2008.0/x86_64/mozilla-firefox-pa_IN-2.0.0.12-1mdv2008.0.x86_64.rpm
b86fa8fb3a49c00bc909efaf22b8e7e2 2008.0/x86_64/mozilla-firefox-pl-2.0.0.12-1mdv2008.0.x86_64.rpm
d5b445d81a5e497fefd3658bcbd76c9d 2008.0/x86_64/mozilla-firefox-pt_BR-2.0.0.12-1mdv2008.0.x86_64.rpm
f6c7c3d82b2e46c0c53674b23bd9f610 2008.0/x86_64/mozilla-firefox-pt_PT-2.0.0.12-1mdv2008.0.x86_64.rpm
c814c511adbc79d7506208c16964dd82 2008.0/x86_64/mozilla-firefox-ro-2.0.0.12-1mdv2008.0.x86_64.rpm
1dbfd204f8b7fdf1a1a3d8a318390982 2008.0/x86_64/mozilla-firefox-ru-2.0.0.12-1mdv2008.0.x86_64.rpm
ff96c040977b5387ac143cb542954605 2008.0/x86_64/mozilla-firefox-sk-2.0.0.12-1mdv2008.0.x86_64.rpm
405bfe183faf8385603c18dba56e462b 2008.0/x86_64/mozilla-firefox-sl-2.0.0.12-1mdv2008.0.x86_64.rpm
09ada1b389808bcfc841b4bf2f58d3b7 2008.0/x86_64/mozilla-firefox-sv_SE-2.0.0.12-1mdv2008.0.x86_64.rpm
5883cf4f015b18e84942ad3b334835ce 2008.0/x86_64/mozilla-firefox-tr-2.0.0.12-1mdv2008.0.x86_64.rpm
a7f9ee2ceb3b72c7e3855850b5b224d9 2008.0/x86_64/mozilla-firefox-uk-2.0.0.12-1mdv2008.0.x86_64.rpm
98171713d09ae8405d2d26eccb166352 2008.0/x86_64/mozilla-firefox-zh_CN-2.0.0.12-1mdv2008.0.x86_64.rpm
907b73fc00a166ab82c90cce9dcb2855 2008.0/x86_64/mozilla-firefox-zh_TW-2.0.0.12-1mdv2008.0.x86_64.rpm
c55f978b69d6c6d0d272613f4d34c6bf 2008.0/x86_64/totem-2.20.1-1.2mdv2008.0.x86_64.rpm
e7bf2fa7b63ba9217356f953a7d6e32a 2008.0/x86_64/totem-common-2.20.1-1.2mdv2008.0.x86_64.rpm
f32ec045873ee9a1e4eada8f14ef370d 2008.0/x86_64/totem-gstreamer-2.20.1-1.2mdv2008.0.x86_64.rpm
268619b6747e69c4011760509d6c4249 2008.0/x86_64/totem-mozilla-2.20.1-1.2mdv2008.0.x86_64.rpm
83e2f72cbce5e5cf2a4fa037e843eddc 2008.0/x86_64/totem-mozilla-gstreamer-2.20.1-1.2mdv2008.0.x86_64.rpm
ee8611f2b5580f819e2380b07ccf8879 2008.0/x86_64/yelp-2.20.0-3.2mdv2008.0.x86_64.rpm
fd64f784036f9a7a67ae7dc4bc840755 2008.0/SRPMS/devhelp-0.16-1.3mdv2008.0.src.rpm
483a9c4d9ae531f9b3586d3a2da2f8a2 2008.0/SRPMS/eclipse-3.3.0-0.20.8.3mdv2008.0.src.rpm
331b129d4ea2db89884b6531a8a7f58b 2008.0/SRPMS/epiphany-2.20.0-1.3mdv2008.0.src.rpm
3c7ab32d75b68e67a68b1933aa477fa9 2008.0/SRPMS/galeon-2.0.3-7.3mdv2008.0.src.rpm
4f71054efcad5f6ea4a41d3f003fd909 2008.0/SRPMS/gnome-python-extras-2.19.1-4.3mdv2008.0.src.rpm
64ec454e2292e0f3d39d1c3b23407957 2008.0/SRPMS/mozilla-firefox-2.0.0.12-1.1mdv2008.0.src.rpm
b0f611d44d02a710ed8d868d745cca25 2008.0/SRPMS/mozilla-firefox-ext-blogrovr-1.1.771-1.1mdv2008.0.src.rpm
344da985922776256af6accfba04672a 2008.0/SRPMS/mozilla-firefox-ext-foxmarks-2.0.43-1mdv2008.0.src.rpm
eb8583166df4ad6591d184af922824c3 2008.0/SRPMS/mozilla-firefox-ext-scribefire-1.4.2-4.1mdv2008.0.src.rpm
9c9ca299024b58a8c292c723724e4aa8 2008.0/SRPMS/mozilla-firefox-l10n-2.0.0.12-1mdv2008.0.src.rpm
db53f00eaa8cc296f6cd1109fe45cc69 2008.0/SRPMS/totem-2.20.1-1.2mdv2008.0.src.rpm
4429b4db2e0c4d1f27abccc8e140023e 2008.0/SRPMS/yelp-2.20.0-3.2mdv2008.0.src.rpm
Corporate 3.0:
550dadd02da46677bd28e11be84af07c corporate/3.0/i586/libnspr4-2.0.0.12-0.1.C30mdk.i586.rpm
4878b838f7b58178db5c5810db1f9dce corporate/3.0/i586/libnspr4-devel-2.0.0.12-0.1.C30mdk.i586.rpm
43eff3ed0e41653190e4d3ae3579cda4 corporate/3.0/i586/libnspr4-static-devel-2.0.0.12-0.1.C30mdk.i586.rpm
c1844362f249aca14692aba19bd0e11f corporate/3.0/i586/libnss3-2.0.0.12-0.1.C30mdk.i586.rpm
8beb45a5fc33b02bf4d148ae9e440414 corporate/3.0/i586/libnss3-devel-2.0.0.12-0.1.C30mdk.i586.rpm
c9aa59e8bb3ac4b4984231d8f01a8505 corporate/3.0/i586/mozilla-firefox-2.0.0.12-0.1.C30mdk.i586.rpm
b1baa8652f174fb7f7abed9b1745bf96 corporate/3.0/i586/mozilla-firefox-ar-2.0.0.12-0.1.C30mdk.i586.rpm
ad5a0a4684cfee839501ecb025d547a2 corporate/3.0/i586/mozilla-firefox-bg-2.0.0.12-0.1.C30mdk.i586.rpm
26a215b87cd1112589a98544dd0ac41e corporate/3.0/i586/mozilla-firefox-br-2.0.0.12-0.1.C30mdk.i586.rpm
43860455bf9bc4bdc0058f6188eff583 corporate/3.0/i586/mozilla-firefox-ca-2.0.0.12-0.1.C30mdk.i586.rpm
ff84769e6cc3e2c176eea3f1378b7f13 corporate/3.0/i586/mozilla-firefox-cs-2.0.0.12-0.1.C30mdk.i586.rpm
712e3c9a7e2c1f31a212a50b6a916d5b corporate/3.0/i586/mozilla-firefox-da-2.0.0.12-0.1.C30mdk.i586.rpm
21384ac68a9a158d05c8a113f657aba7 corporate/3.0/i586/mozilla-firefox-de-2.0.0.12-0.1.C30mdk.i586.rpm
ff3b79ce5a8557d51215a95a91ce7a57 corporate/3.0/i586/mozilla-firefox-devel-2.0.0.12-0.1.C30mdk.i586.rpm
817f8ac7f07ca552507861270ab673b1 corporate/3.0/i586/mozilla-firefox-el-2.0.0.12-0.1.C30mdk.i586.rpm
9e4bf251eb7211e3c13c652470edd2f4 corporate/3.0/i586/mozilla-firefox-es-2.0.0.12-0.1.C30mdk.i586.rpm
50bce55b911214d0b6169fbc5b022f10 corporate/3.0/i586/mozilla-firefox-es_AR-2.0.0.12-0.1.C30mdk.i586.rpm
a119c958b460012f0692de2e95d88dcc corporate/3.0/i586/mozilla-firefox-eu-2.0.0.12-0.1.C30mdk.i586.rpm
d1563fb09d46065a4142c346e2b51f7a corporate/3.0/i586/mozilla-firefox-fi-2.0.0.12-0.1.C30mdk.i586.rpm
e6683f7f2671ac6e391feb1856e07b4c corporate/3.0/i586/mozilla-firefox-fr-2.0.0.12-0.1.C30mdk.i586.rpm
32ed3343c587ce65670f8889215efd13 corporate/3.0/i586/mozilla-firefox-fy-2.0.0.12-0.1.C30mdk.i586.rpm
1b4949f6924352d891e267a372976ee7 corporate/3.0/i586/mozilla-firefox-ga-2.0.0.12-0.1.C30mdk.i586.rpm
2feaa589901cdd5814e178f93a67a9d2 corporate/3.0/i586/mozilla-firefox-gu_IN-2.0.0.12-0.1.C30mdk.i586.rpm
e3dd4574d2c17e0dd0ab6c24e01a7ef0 corporate/3.0/i586/mozilla-firefox-he-2.0.0.12-0.1.C30mdk.i586.rpm
2bc8200cea954caeb99a101f15c82fa3 corporate/3.0/i586/mozilla-firefox-hu-2.0.0.12-0.1.C30mdk.i586.rpm
e4089156af8dd0ef08a75896345c4abe corporate/3.0/i586/mozilla-firefox-it-2.0.0.12-0.1.C30mdk.i586.rpm
17b4af5dd41ffa19979372389bbe5894 corporate/3.0/i586/mozilla-firefox-ja-2.0.0.12-0.1.C30mdk.i586.rpm
d360ae8b94e9f161654f0e1ad3db809a corporate/3.0/i586/mozilla-firefox-ko-2.0.0.12-0.1.C30mdk.i586.rpm
3e582e8d8b624d54fe07883213e20d90 corporate/3.0/i586/mozilla-firefox-lt-2.0.0.12-0.1.C30mdk.i586.rpm
7e490e7bcb8cda57769866a8b810e443 corporate/3.0/i586/mozilla-firefox-mk-2.0.0.12-0.1.C30mdk.i586.rpm
f309b26c279b470d8337f65914674b89 corporate/3.0/i586/mozilla-firefox-nb-2.0.0.12-0.1.C30mdk.i586.rpm
720d18b177136d5d96910329d9f7ee25 corporate/3.0/i586/mozilla-firefox-nl-2.0.0.12-0.1.C30mdk.i586.rpm
24c61982d71a2d63bf71bb0faccf90a1 corporate/3.0/i586/mozilla-firefox-pa_IN-2.0.0.12-0.1.C30mdk.i586.rpm
036712e98bbbef9a7966dfbd81954866 corporate/3.0/i586/mozilla-firefox-pl-2.0.0.12-0.1.C30mdk.i586.rpm
0619996ce1e3dc99084c013100918c71 corporate/3.0/i586/mozilla-firefox-pt-2.0.0.12-0.1.C30mdk.i586.rpm
0f14d3385b03309473925c5b139afee3 corporate/3.0/i586/mozilla-firefox-pt_BR-2.0.0.12-0.1.C30mdk.i586.rpm
b7cd96a7431cb825c7db41bb4c85cc0c corporate/3.0/i586/mozilla-firefox-ro-2.0.0.12-0.1.C30mdk.i586.rpm
0f22a5c8cc4ebe9c95965f7f6a35e25e corporate/3.0/i586/mozilla-firefox-ru-2.0.0.12-0.1.C30mdk.i586.rpm
a1c92a73dbad5c475d76cf4eb8fe8947 corporate/3.0/i586/mozilla-firefox-sk-2.0.0.12-0.1.C30mdk.i586.rpm
d0e46219f3bfb285d1aa5042a11c4c2f corporate/3.0/i586/mozilla-firefox-sl-2.0.0.12-0.1.C30mdk.i586.rpm
65fbb88b91f6f18faf6bfcd7637d99b9 corporate/3.0/i586/mozilla-firefox-sv-2.0.0.12-0.1.C30mdk.i586.rpm
1e6dd377fc1e89cf1b70faa96e234604 corporate/3.0/i586/mozilla-firefox-tr-2.0.0.12-0.1.C30mdk.i586.rpm
1aabd75d4be1b00ed69f61805737dc43 corporate/3.0/i586/mozilla-firefox-uk-2.0.0.12-0.1.C30mdk.i586.rpm
0f5612378dae917f0268326ad0036b87 corporate/3.0/i586/mozilla-firefox-zh_CN-2.0.0.12-0.1.C30mdk.i586.rpm
32f3121c6d0b5491057d1cfd3380a8b6 corporate/3.0/i586/mozilla-firefox-zh_TW-2.0.0.12-0.1.C30mdk.i586.rpm
bc6071a867462a8f2a44aa4896530fe6 corporate/3.0/SRPMS/mozilla-firefox-2.0.0.12-0.1.C30mdk.src.rpm
3716609be655be6acb6f567c0eb7dbea corporate/3.0/SRPMS/mozilla-firefox-l10n-2.0.0.12-0.1.C30mdk.src.rpm
Corporate 3.0/X86_64:
23db9d7edef5b8116b6f3cf853819461 corporate/3.0/x86_64/lib64nspr4-2.0.0.12-0.1.C30mdk.x86_64.rpm
0729f4ac4b61f25e3ae816e12acef5ea corporate/3.0/x86_64/lib64nspr4-devel-2.0.0.12-0.1.C30mdk.x86_64.rpm
54d5a161aeda3c3a1754f3b559eec78b corporate/3.0/x86_64/lib64nspr4-static-devel-2.0.0.12-0.1.C30mdk.x86_64.rpm
53339583f214c0cfa61966b2730d4676 corporate/3.0/x86_64/lib64nss3-2.0.0.12-0.1.C30mdk.x86_64.rpm
a4a1bdc3da133c4d39950b865ebb6cab corporate/3.0/x86_64/lib64nss3-devel-2.0.0.12-0.1.C30mdk.x86_64.rpm
c8476b439226f4db336d0500bbfcb441 corporate/3.0/x86_64/mozilla-firefox-2.0.0.12-0.1.C30mdk.x86_64.rpm
9562e49d98011a072ee5c1eb35ee42c7 corporate/3.0/x86_64/mozilla-firefox-ar-2.0.0.12-0.1.C30mdk.x86_64.rpm
aa61d7753d91cf385ecf79a42e8e3aec corporate/3.0/x86_64/mozilla-firefox-bg-2.0.0.12-0.1.C30mdk.x86_64.rpm
c8c27fcd9be3ee89f9aea52489bd8c03 corporate/3.0/x86_64/mozilla-firefox-br-2.0.0.12-0.1.C30mdk.x86_64.rpm
98eba3b228afab21f0c2df55a08b79d6 corporate/3.0/x86_64/mozilla-firefox-ca-2.0.0.12-0.1.C30mdk.x86_64.rpm
cc3f2d7c0e3b5f4b893d63790c512636 corporate/3.0/x86_64/mozilla-firefox-cs-2.0.0.12-0.1.C30mdk.x86_64.rpm
d7d36a8f27c362cec8b48dbff49fe46a corporate/3.0/x86_64/mozilla-firefox-da-2.0.0.12-0.1.C30mdk.x86_64.rpm
ffe44e168f6524cd80ceb21207c88006 corporate/3.0/x86_64/mozilla-firefox-de-2.0.0.12-0.1.C30mdk.x86_64.rpm
aaf6416b5ea970b3ef61b4b650f13867 corporate/3.0/x86_64/mozilla-firefox-devel-2.0.0.12-0.1.C30mdk.x86_64.rpm
ebaa3a59ec5594164601c5968e6b128f corporate/3.0/x86_64/mozilla-firefox-el-2.0.0.12-0.1.C30mdk.x86_64.rpm
ceb7ce9e4eccc391712bbec3737e1280 corporate/3.0/x86_64/mozilla-firefox-es-2.0.0.12-0.1.C30mdk.x86_64.rpm
1555aa2ecb1e8beb1949edd6e1672c9d corporate/3.0/x86_64/mozilla-firefox-es_AR-2.0.0.12-0.1.C30mdk.x86_64.rpm
68fa37147805715cfa1bc399c3a3ae12 corporate/3.0/x86_64/mozilla-firefox-eu-2.0.0.12-0.1.C30mdk.x86_64.rpm
f50964fc639fd5b394b513c42c700076 corporate/3.0/x86_64/mozilla-firefox-fi-2.0.0.12-0.1.C30mdk.x86_64.rpm
3bc78e57665df763604b1f30329fad7e corporate/3.0/x86_64/mozilla-firefox-fr-2.0.0.12-0.1.C30mdk.x86_64.rpm
9e2139f1c4d6642be56727ac4bc9bc31 corporate/3.0/x86_64/mozilla-firefox-fy-2.0.0.12-0.1.C30mdk.x86_64.rpm
091b74c2f82f9b59d1b3b14ce8de6adb corporate/3.0/x86_64/mozilla-firefox-ga-2.0.0.12-0.1.C30mdk.x86_64.rpm
c27e033bd501d9b09bc83f9d43be0442 corporate/3.0/x86_64/mozilla-firefox-gu_IN-2.0.0.12-0.1.C30mdk.x86_64.rpm
32f71e68bb9baacad0046e9d264ed141 corporate/3.0/x86_64/mozilla-firefox-he-2.0.0.12-0.1.C30mdk.x86_64.rpm
381fa53f3ea9ae644151f891e0688bbc corporate/3.0/x86_64/mozilla-firefox-hu-2.0.0.12-0.1.C30mdk.x86_64.rpm
5c3ae6486d80294e3838de7ea8dd343b corporate/3.0/x86_64/mozilla-firefox-it-2.0.0.12-0.1.C30mdk.x86_64.rpm
f97e6f40ccb3928672726b6adabd83ac corporate/3.0/x86_64/mozilla-firefox-ja-2.0.0.12-0.1.C30mdk.x86_64.rpm
3516aab6dfbee80f7c38ad30988d200c corporate/3.0/x86_64/mozilla-firefox-ko-2.0.0.12-0.1.C30mdk.x86_64.rpm
035763a9668bb260b123850757a62144 corporate/3.0/x86_64/mozilla-firefox-lt-2.0.0.12-0.1.C30mdk.x86_64.rpm
97af652341c9904dfd11b3ed9264040c corporate/3.0/x86_64/mozilla-firefox-mk-2.0.0.12-0.1.C30mdk.x86_64.rpm
2f1324470036d1267a4ab4b0e08c4596 corporate/3.0/x86_64/mozilla-firefox-nb-2.0.0.12-0.1.C30mdk.x86_64.rpm
e75ca84863e4d2c5fce1a4a455c0171f corporate/3.0/x86_64/mozilla-firefox-nl-2.0.0.12-0.1.C30mdk.x86_64.rpm
c83fc2d11b218e35937ba8929ea4255d corporate/3.0/x86_64/mozilla-firefox-pa_IN-2.0.0.12-0.1.C30mdk.x86_64.rpm
c183055127e20b1eb233ffe81b886817 corporate/3.0/x86_64/mozilla-firefox-pl-2.0.0.12-0.1.C30mdk.x86_64.rpm
3ebb35651e4705b782d0f4cdff5c64ee corporate/3.0/x86_64/mozilla-firefox-pt-2.0.0.12-0.1.C30mdk.x86_64.rpm
39a6d80360c585312f02a307b0840c2d corporate/3.0/x86_64/mozilla-firefox-pt_BR-2.0.0.12-0.1.C30mdk.x86_64.rpm
90f966ed0e5b6d549909d6ae619ee0e6 corporate/3.0/x86_64/mozilla-firefox-ro-2.0.0.12-0.1.C30mdk.x86_64.rpm
74e8392f29214ddef8f0369afed3265f corporate/3.0/x86_64/mozilla-firefox-ru-2.0.0.12-0.1.C30mdk.x86_64.rpm
57ea4a96ea3610ecbb438ff32ac9661a corporate/3.0/x86_64/mozilla-firefox-sk-2.0.0.12-0.1.C30mdk.x86_64.rpm
df8f8377b181bb1f0b38c0575081f590 corporate/3.0/x86_64/mozilla-firefox-sl-2.0.0.12-0.1.C30mdk.x86_64.rpm
f603bed6dbea7f856a992c15e2c4b248 corporate/3.0/x86_64/mozilla-firefox-sv-2.0.0.12-0.1.C30mdk.x86_64.rpm
bff17af242fd945eb81e7a82482f6d6b corporate/3.0/x86_64/mozilla-firefox-tr-2.0.0.12-0.1.C30mdk.x86_64.rpm
297fa42612958e1e62f4d2509c0cac8f corporate/3.0/x86_64/mozilla-firefox-uk-2.0.0.12-0.1.C30mdk.x86_64.rpm
fdfba5ea07d613b6e6c3449469af1d8a corporate/3.0/x86_64/mozilla-firefox-zh_CN-2.0.0.12-0.1.C30mdk.x86_64.rpm
93c97d643d6fa49221f6242617acfc15 corporate/3.0/x86_64/mozilla-firefox-zh_TW-2.0.0.12-0.1.C30mdk.x86_64.rpm
bc6071a867462a8f2a44aa4896530fe6 corporate/3.0/SRPMS/mozilla-firefox-2.0.0.12-0.1.C30mdk.src.rpm
3716609be655be6acb6f567c0eb7dbea corporate/3.0/SRPMS/mozilla-firefox-l10n-2.0.0.12-0.1.C30mdk.src.rpm
Corporate 4.0:
1d1711379f878dc9870bd4413e8e7f68 corporate/4.0/i586/libnspr4-2.0.0.12-0.1.20060mlcs4.i586.rpm
0d7f47aad1001d5131e9aa1de7629982 corporate/4.0/i586/libnspr4-devel-2.0.0.12-0.1.20060mlcs4.i586.rpm
4dc18c70a562094a2a35f6e4473860ce corporate/4.0/i586/libnspr4-static-devel-2.0.0.12-0.1.20060mlcs4.i586.rpm
07af2aec6447f914d2b35dec625b713f corporate/4.0/i586/libnss3-2.0.0.12-0.1.20060mlcs4.i586.rpm
089ae34703ea533c88191b886ed050a2 corporate/4.0/i586/libnss3-devel-2.0.0.12-0.1.20060mlcs4.i586.rpm
91c7705419d9ba1c6f0662e3bc363bf6 corporate/4.0/i586/mozilla-firefox-2.0.0.12-0.1.20060mlcs4.i586.rpm
7408018fbb857928a5af67ccb0e90886 corporate/4.0/i586/mozilla-firefox-af-2.0.0.12-0.1.20060mlcs4.i586.rpm
80f7f6d7f638005a44e570ed28507ea6 corporate/4.0/i586/mozilla-firefox-ar-2.0.0.12-0.1.20060mlcs4.i586.rpm
322684cd222712ce7fdc179ecd5f33b7 corporate/4.0/i586/mozilla-firefox-be-2.0.0.12-0.1.20060mlcs4.i586.rpm
a7d1d5f436099bcad673f3bf3931c774 corporate/4.0/i586/mozilla-firefox-bg-2.0.0.12-0.1.20060mlcs4.i586.rpm
c17e5bef41741156084573378cc68600 corporate/4.0/i586/mozilla-firefox-br_FR-2.0.0.12-0.1.20060mlcs4.i586.rpm
2a6ead1a302cfecc5faa8ea663c560da corporate/4.0/i586/mozilla-firefox-ca-2.0.0.12-0.1.20060mlcs4.i586.rpm
5695e1d5884f70f853522cee17e80ca5 corporate/4.0/i586/mozilla-firefox-cs-2.0.0.12-0.1.20060mlcs4.i586.rpm
a478f4f622ffbb68551fc6dab3412b41 corporate/4.0/i586/mozilla-firefox-da-2.0.0.12-0.1.20060mlcs4.i586.rpm
b573268e97885502650536df6d5e8d41 corporate/4.0/i586/mozilla-firefox-de-2.0.0.12-0.1.20060mlcs4.i586.rpm
047972e5977f81ede7b12737bc986016 corporate/4.0/i586/mozilla-firefox-devel-2.0.0.12-0.1.20060mlcs4.i586.rpm
7c166d1cf63e97c0dfc7fffa95c9c05a corporate/4.0/i586/mozilla-firefox-el-2.0.0.12-0.1.20060mlcs4.i586.rpm
cebc280567909d6019221908ab8d8005 corporate/4.0/i586/mozilla-firefox-en_GB-2.0.0.12-0.1.20060mlcs4.i586.rpm
1f55d95a626c5e3e60f1835ec38f3030 corporate/4.0/i586/mozilla-firefox-es_AR-2.0.0.12-0.1.20060mlcs4.i586.rpm
f3b8a973d1b877940228971660894755 corporate/4.0/i586/mozilla-firefox-es_ES-2.0.0.12-0.1.20060mlcs4.i586.rpm
8b062bf830d02da9b0633fb5b0d8694b corporate/4.0/i586/mozilla-firefox-et_EE-2.0.0.12-0.1.20060mlcs4.i586.rpm
99155f12e37fa7f0d233afbf7e6eb77c corporate/4.0/i586/mozilla-firefox-eu-2.0.0.12-0.1.20060mlcs4.i586.rpm
101d3e38b83859fdccd147befe69e323 corporate/4.0/i586/mozilla-firefox-fi-2.0.0.12-0.1.20060mlcs4.i586.rpm
591382083fd187a78b807f2058a47500 corporate/4.0/i586/mozilla-firefox-fr-2.0.0.12-0.1.20060mlcs4.i586.rpm
31c0256fd7f5611dcadac9d65299e4d1 corporate/4.0/i586/mozilla-firefox-fy-2.0.0.12-0.1.20060mlcs4.i586.rpm
88ddcd6d685311d4935eb9c920df7f5a corporate/4.0/i586/mozilla-firefox-ga-2.0.0.12-0.1.20060mlcs4.i586.rpm
f16d908c50d3367edf84d8f57ab98658 corporate/4.0/i586/mozilla-firefox-gu_IN-2.0.0.12-0.1.20060mlcs4.i586.rpm
de1d6367ee761e4795a479b56e386db7 corporate/4.0/i586/mozilla-firefox-he-2.0.0.12-0.1.20060mlcs4.i586.rpm
77aec187f4ed84e887c0a7f309f4b392 corporate/4.0/i586/mozilla-firefox-hu-2.0.0.12-0.1.20060mlcs4.i586.rpm
282b43d2d3588e402f543db6e04f2f0f corporate/4.0/i586/mozilla-firefox-it-2.0.0.12-0.1.20060mlcs4.i586.rpm
b47cc4f29ae05002de87dec506629da4 corporate/4.0/i586/mozilla-firefox-ja-2.0.0.12-0.1.20060mlcs4.i586.rpm
293674a0d6da859c704bbf810ec70058 corporate/4.0/i586/mozilla-firefox-ka-2.0.0.12-0.1.20060mlcs4.i586.rpm
545f8f041f6b9261e82a4aac2cb43252 corporate/4.0/i586/mozilla-firefox-ko-2.0.0.12-0.1.20060mlcs4.i586.rpm
c302d3b9648c5000e3f7901bb4bee1f3 corporate/4.0/i586/mozilla-firefox-ku-2.0.0.12-0.1.20060mlcs4.i586.rpm
731481cef1ae784c12cbc315578cccc4 corporate/4.0/i586/mozilla-firefox-lt-2.0.0.12-0.1.20060mlcs4.i586.rpm
dd7c48caf2f47bdf798b59ea3ae559f0 corporate/4.0/i586/mozilla-firefox-mk-2.0.0.12-0.1.20060mlcs4.i586.rpm
5b253e55912e1a02d6f0dc83b553dbc9 corporate/4.0/i586/mozilla-firefox-mn-2.0.0.12-0.1.20060mlcs4.i586.rpm
cd40523fa6a2d66fe7da492ffe4ad14e corporate/4.0/i586/mozilla-firefox-nb_NO-2.0.0.12-0.1.20060mlcs4.i586.rpm
f2a96a4a1164c6e2fa15fb9f679f7b09 corporate/4.0/i586/mozilla-firefox-nl-2.0.0.12-0.1.20060mlcs4.i586.rpm
06cc7a4e01a22db0d2245c28310f30cf corporate/4.0/i586/mozilla-firefox-nn_NO-2.0.0.12-0.1.20060mlcs4.i586.rpm
f775f685d33f5f72db3e38b126818981 corporate/4.0/i586/mozilla-firefox-pa_IN-2.0.0.12-0.1.20060mlcs4.i586.rpm
43a81c2218d37a9d78426616805db926 corporate/4.0/i586/mozilla-firefox-pl-2.0.0.12-0.1.20060mlcs4.i586.rpm
4663ab7aa12e2d3b76dba84708023fe1 corporate/4.0/i586/mozilla-firefox-pt_BR-2.0.0.12-0.1.20060mlcs4.i586.rpm
54471048e1c8cb1db9a7b4969bf2746e corporate/4.0/i586/mozilla-firefox-pt_PT-2.0.0.12-0.1.20060mlcs4.i586.rpm
8254befda8ff5971ceb82c10401d635b corporate/4.0/i586/mozilla-firefox-ro-2.0.0.12-0.1.20060mlcs4.i586.rpm
3b046ee77e70b291e7c59c01be14bc03 corporate/4.0/i586/mozilla-firefox-ru-2.0.0.12-0.1.20060mlcs4.i586.rpm
c657ff4c7aee04107a1ff720c308af1f corporate/4.0/i586/mozilla-firefox-sk-2.0.0.12-0.1.20060mlcs4.i586.rpm
e20b0dfc4235bc5f970de1f788875f62 corporate/4.0/i586/mozilla-firefox-sl-2.0.0.12-0.1.20060mlcs4.i586.rpm
017b941dd46c33b86b89b59b52488648 corporate/4.0/i586/mozilla-firefox-sv_SE-2.0.0.12-0.1.20060mlcs4.i586.rpm
548ff5316add85b2242194931546b211 corporate/4.0/i586/mozilla-firefox-tr-2.0.0.12-0.1.20060mlcs4.i586.rpm
d0a98b2311dcffe4f4aaa9cb18af9c59 corporate/4.0/i586/mozilla-firefox-uk-2.0.0.12-0.1.20060mlcs4.i586.rpm
1f9348318f243fe9125a01e68fb3a621 corporate/4.0/i586/mozilla-firefox-zh_CN-2.0.0.12-0.1.20060mlcs4.i586.rpm
ef213595b8e62754329e80e9b3482eb1 corporate/4.0/i586/mozilla-firefox-zh_TW-2.0.0.12-0.1.20060mlcs4.i586.rpm
e9a3ebed36c203507377ceda77761c7f corporate/4.0/SRPMS/mozilla-firefox-2.0.0.12-0.1.20060mlcs4.src.rpm
239d3534086a45aec6b748c8a392848d corporate/4.0/SRPMS/mozilla-firefox-l10n-2.0.0.12-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
6f27683c589e7cfe916aea2acc9ea4c5 corporate/4.0/x86_64/lib64nspr4-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
0b49dc9f56bfdbcab6667c317cd09d20 corporate/4.0/x86_64/lib64nspr4-devel-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
3b30beb9068bb3c4c93a2851efe5a072 corporate/4.0/x86_64/lib64nspr4-static-devel-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
1b1317be6976c1813bad0fae43195672 corporate/4.0/x86_64/lib64nss3-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
4462f8c4edae09073be451aa5687a9d5 corporate/4.0/x86_64/lib64nss3-devel-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
7a09a6157916830003822a98fe6cfacb corporate/4.0/x86_64/mozilla-firefox-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
0d65bb5086ea4a27857d6a2b9c06fd28 corporate/4.0/x86_64/mozilla-firefox-af-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
a73e472c10837caa909e4757c8a38a13 corporate/4.0/x86_64/mozilla-firefox-ar-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
c1d2fc656d5480c7efe54206e0cba359 corporate/4.0/x86_64/mozilla-firefox-be-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
187a400e7cba77d1d557ad1661c89f70 corporate/4.0/x86_64/mozilla-firefox-bg-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
848f364c27f60a1b57f651a11fd7bfc9 corporate/4.0/x86_64/mozilla-firefox-br_FR-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
fc687b68c63ad17b029aaf40b09081bd corporate/4.0/x86_64/mozilla-firefox-ca-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
e0f608bc089b65b7d8f4c39e70fdb07f corporate/4.0/x86_64/mozilla-firefox-cs-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
757e556773ac9d8daca19a8ee900d852 corporate/4.0/x86_64/mozilla-firefox-da-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
e29b10677a086988ce206e2ea8046176 corporate/4.0/x86_64/mozilla-firefox-de-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
469fff1b83157501441463e6d448a5db corporate/4.0/x86_64/mozilla-firefox-devel-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
883b2bfccc861c66d87ee2d743ccdcfb corporate/4.0/x86_64/mozilla-firefox-el-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
df11d3c06d75e44370f5c4d51aec25a3 corporate/4.0/x86_64/mozilla-firefox-en_GB-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
ca1e033902408029c4fd40af3be1884e corporate/4.0/x86_64/mozilla-firefox-es_AR-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
abc14977ab3e412fc421d36b1f5e5a05 corporate/4.0/x86_64/mozilla-firefox-es_ES-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
771b80cadf087492fe3322b7a6f7f66f corporate/4.0/x86_64/mozilla-firefox-et_EE-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
15a19b591c1349aed2021869e2a4c66f corporate/4.0/x86_64/mozilla-firefox-eu-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
d93321763495ff74aea00cee5dc084db corporate/4.0/x86_64/mozilla-firefox-fi-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
aa1fc91f9e645543766005a4752778dd corporate/4.0/x86_64/mozilla-firefox-fr-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
eddf29eeda44341e9cc838f1c6b24d19 corporate/4.0/x86_64/mozilla-firefox-fy-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
2e838ecca5557cc805641c3d0a285011 corporate/4.0/x86_64/mozilla-firefox-ga-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
4809fd91537881354a71fc93ff98449c corporate/4.0/x86_64/mozilla-firefox-gu_IN-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
a1617c1c7ae11b0a59e4c20e28b32559 corporate/4.0/x86_64/mozilla-firefox-he-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
2d1a864a44662e615dd169969cdac87a corporate/4.0/x86_64/mozilla-firefox-hu-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
9daafb45ed2580d3aa942fb9c2724afa corporate/4.0/x86_64/mozilla-firefox-it-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
a9b48b99056e9357e8f93234ffc35ddd corporate/4.0/x86_64/mozilla-firefox-ja-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
c16c37481ea46a9cd9925cb6a817c1c3 corporate/4.0/x86_64/mozilla-firefox-ka-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
228fa42007d14c1b14e9de4baf5dd736 corporate/4.0/x86_64/mozilla-firefox-ko-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
a1943be2528497fce78f3e046a75e133 corporate/4.0/x86_64/mozilla-firefox-ku-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
a36832b9cb2d40e20001ef05c7976ddc corporate/4.0/x86_64/mozilla-firefox-lt-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
0556b33cd92d1d98ffb76b75f00ea560 corporate/4.0/x86_64/mozilla-firefox-mk-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
94962bae734a9f359faf26c98db1ac0b corporate/4.0/x86_64/mozilla-firefox-mn-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
6327ba03cbceb74e666dd777511d2a20 corporate/4.0/x86_64/mozilla-firefox-nb_NO-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
aaa50342a183c21a0fb8e9971e47906e corporate/4.0/x86_64/mozilla-firefox-nl-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
a2433065a1d07f75399737767c455f7e corporate/4.0/x86_64/mozilla-firefox-nn_NO-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
214139bf12caf296595593ab5482d0e5 corporate/4.0/x86_64/mozilla-firefox-pa_IN-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
2e4fe93846ddfcbb40418de9cc8e2fad corporate/4.0/x86_64/mozilla-firefox-pl-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
ec0005d0f605c13b271c462d8a1e3803 corporate/4.0/x86_64/mozilla-firefox-pt_BR-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
26e0d940070213998d15c6de8cd4a2e3 corporate/4.0/x86_64/mozilla-firefox-pt_PT-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
dd357d608e05e3b3690916ac18658d60 corporate/4.0/x86_64/mozilla-firefox-ro-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
2517bd66238ea45344c179dc040b3e35 corporate/4.0/x86_64/mozilla-firefox-ru-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
a36da3c0bdd8b7b795c8231dbe38ef0e corporate/4.0/x86_64/mozilla-firefox-sk-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
81da62c563e988f6774e92f7bb89ec08 corporate/4.0/x86_64/mozilla-firefox-sl-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
049a3781090a939f28ea96feda01dc43 corporate/4.0/x86_64/mozilla-firefox-sv_SE-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
464a604c992f8c6e6ac2e9b30deec767 corporate/4.0/x86_64/mozilla-firefox-tr-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
e893954f8e64d1e9d0750e22a5ec2eae corporate/4.0/x86_64/mozilla-firefox-uk-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
4e176083661abe3e461e43381659146e corporate/4.0/x86_64/mozilla-firefox-zh_CN-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
b030162e1689f266f9d11d537546d50f corporate/4.0/x86_64/mozilla-firefox-zh_TW-2.0.0.12-0.1.20060mlcs4.x86_64.rpm
e9a3ebed36c203507377ceda77761c7f corporate/4.0/SRPMS/mozilla-firefox-2.0.0.12-0.1.20060mlcs4.src.rpm
239d3534086a45aec6b748c8a392848d corporate/4.0/SRPMS/mozilla-firefox-l10n-2.0.0.12-0.1.20060mlcs4.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)
iD8DBQFHvzANmqjQ0CJFipgRAnAJAJ9WP5c754QfYoGIwYl7Q+g7bYtvkACgys8n
LD1VivpQi4F20e4H0MamS58=
=oe/t
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-200802-0084 | CVE-2008-0945 | Ipswitch IM of IM Server of logging Format string vulnerability in functions |
CVSS V2: 3.5 CVSS V3: - Severity: LOW |
Format string vulnerability in the logging function in the IM Server (aka IMserve or IMserver) in Ipswitch Instant Messaging (IM) 2.0.8.1 and earlier allows remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in an IP address field. Ipswitch Instant Messaging is prone to multiple security vulnerabilities, including a denial-of-service vulnerability, a format-string vulnerability, and a vulnerability that allows attackers to overwrite arbitrary files.
Attackers can exploit these issues to execute arbitrary code, cause denial-of-service conditions, or overwrite files with arbitrary content.
These issues affect Ipswitch Instant Messaging 2.0.8.1; other versions may also be affected.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Ipswitch Instant Messaging IMServer Denial of Service
SECUNIA ADVISORY ID:
SA28824
VERIFY ADVISORY:
http://secunia.com/advisories/28824/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
Ipswitch Instant Messaging 2.x
http://secunia.com/product/14854/
Ipswitch Collaboration Suite (ICS) 2.x
http://secunia.com/product/5167/
DESCRIPTION:
Luigi Auriemma has discovered a vulnerability in Ipswitch Instant
Messaging, which can be exploited by malicious people to cause a DoS
(Denial of Service).
The vulnerability is caused due to an error in the IMServer service
(IMServer.exe) and can be exploited to crash the service via a
specially crafted packet sent to default port 5177/TCP.
NOTE: Other errors have also been reported e.g. a format-string error
in the logging function.
The vulnerability is confirmed in version 2.08 and is also reported
to affect the IM clients.
SOLUTION:
Use in a trusted network environment only.
PROVIDED AND/OR DISCOVERED BY:
Luigi Auriemma
ORIGINAL ADVISORY:
http://aluigi.altervista.org/adv/ipsimene-adv.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200802-0085 | CVE-2008-0946 | Ipswitch IM of IM Server Vulnerable to directory traversal |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Directory traversal vulnerability in the IM Server (aka IMserve or IMserver) in Ipswitch Instant Messaging (IM) 2.0.8.1 and earlier allows remote authenticated users to create arbitrary empty files via a .. (dot dot) in the recipient field.
Attackers can exploit these issues to execute arbitrary code, cause denial-of-service conditions, or overwrite files with arbitrary content.
These issues affect Ipswitch Instant Messaging 2.0.8.1; other versions may also be affected. Remote authentication users can create arbitrary empty files with ".." in the message receiver field
VAR-200802-0083 | CVE-2008-0944 | Ipswitch IM Service disruption in (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Ipswitch Instant Messaging (IM) 2.0.8.1 and earlier allows remote attackers to cause a denial of service (NULL dereference and application crash) via a version field containing zero. Ipswitch Instant Messaging is prone to multiple security vulnerabilities, including a denial-of-service vulnerability, a format-string vulnerability, and a vulnerability that allows attackers to overwrite arbitrary files.
Attackers can exploit these issues to execute arbitrary code, cause denial-of-service conditions, or overwrite files with arbitrary content.
These issues affect Ipswitch Instant Messaging 2.0.8.1; other versions may also be affected. Ipswitch Instant Messaging (IM) has a denial of service vulnerability.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Ipswitch Instant Messaging IMServer Denial of Service
SECUNIA ADVISORY ID:
SA28824
VERIFY ADVISORY:
http://secunia.com/advisories/28824/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
Ipswitch Instant Messaging 2.x
http://secunia.com/product/14854/
Ipswitch Collaboration Suite (ICS) 2.x
http://secunia.com/product/5167/
DESCRIPTION:
Luigi Auriemma has discovered a vulnerability in Ipswitch Instant
Messaging, which can be exploited by malicious people to cause a DoS
(Denial of Service).
The vulnerability is caused due to an error in the IMServer service
(IMServer.exe) and can be exploited to crash the service via a
specially crafted packet sent to default port 5177/TCP.
NOTE: Other errors have also been reported e.g. a format-string error
in the logging function.
The vulnerability is confirmed in version 2.08 and is also reported
to affect the IM clients.
SOLUTION:
Use in a trusted network environment only.
PROVIDED AND/OR DISCOVERED BY:
Luigi Auriemma
ORIGINAL ADVISORY:
http://aluigi.altervista.org/adv/ipsimene-adv.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200802-0381 | CVE-2008-0662 | Check Point VPN-1 SecuRemote/SecureClient NGX Privilege Acquisition Vulnerability in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials. Check Point VPN-1 SecureClient/SecuRemote client for Microsoft Windows is prone to an information-disclosure vulnerability because it fails to protect users' login credentials.
Attackers can exploit this issue to harvest VPN login credentials and gain unauthorized access to networks and resources protected by the VPN. This may lead to further attacks.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
VPN-1 SecuRemote/SecureClient NGX R60 and NGAI R56 Information
Disclosure
SECUNIA ADVISORY ID:
SA28820
VERIFY ADVISORY:
http://secunia.com/advisories/28820/
CRITICAL:
Less critical
IMPACT:
Exposure of sensitive information
WHERE:
Local system
SOFTWARE:
Check Point VPN-1 SecureClient
http://secunia.com/product/2966/
Check Point VPN-1 SecuRemote
http://secunia.com/product/2180/
DESCRIPTION:
A vulnerability has been reported in VPN-1 SecuRemote/SecureClient
NGX R60 and NGAI R56, which can be exploited by malicious, local
users to disclose sensitive information.
The vulnerability is caused due to the application storing user
credentials within the Windows registry
(HKLM\Software\Checkpoint\SecuRemote, subkey "Credentials") without
proper permission settings. This can be exploited to disclose and use
the credentials of other users.
Successful exploitation reportedly requires that caching of
credentials is enabled.
The vulnerability is reported in VPN-1 SecuRemote/SecureClient NGX
R60 and NGAI R56 for Windows.
SOLUTION:
Apply "VPN-1 SecuRemote/SecureClient NGX R60 HFA_02 Supplement 2".
http://checkpoint.com/downloads/quicklinks/downloads_sr.html
PROVIDED AND/OR DISCOVERED BY:
Mike Vasquez, digihax
ORIGINAL ADVISORY:
https://supportcenter.checkpoint.com/supportcenter/PublicLoginRedirect.jsp?toURL=eventSubmit_doGoviewsolutiondetails=%26solutionid=sk34315
digihax:
http://digihax.com/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200812-0134 | CVE-2008-5692 | Ipswitch WS_FTP Server Manager Vulnerable to read logs |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Ipswitch WS_FTP Server Manager before 6.1.1, and possibly other Ipswitch products, allows remote attackers to bypass authentication and read logs via a logLogout action to FTPLogServer/login.asp followed by a request to FTPLogServer/LogViewer.asp with the localhostnull account name. WS_FTP Server Manager is prone to an authentication-bypass vulnerability and an information-disclosure vulnerability.
An attacker can exploit these issues to gain unauthorized access to the affected application and gain access to potentially sensitive information.
These issues affect WS_FTP Server Manager 6.1.0.0; prior versions may also be affected. Ipswitch WS_FTP Server is a highly secure and easy-to-manage file transfer server.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
IPSwitch WS_FTP Server Manager Security Bypass
SECUNIA ADVISORY ID:
SA28822
VERIFY ADVISORY:
http://secunia.com/advisories/28822/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Exposure of sensitive information
WHERE:
>From remote
SOFTWARE:
WS_FTP Server 6.x
http://secunia.com/product/14782/
DESCRIPTION:
Luigi Auriemma has discovered a security issue in IPSwitch WS_FTP
Server, which can be exploited by malicious people to bypass certain
access restrictions and disclose sensitive information.
The security issue is caused due to an error within the WS_FTP Server
Manager when processing HTTP requests for the
FTPLogServer/LogViewer.asp script. This can be exploited to gain
access to the log viewing interface by e.g. logging out and directly
accessing the FTPLogServer/LogViewer.asp script.
SOLUTION:
Restrict access to trusted users only.
PROVIDED AND/OR DISCOVERED BY:
Luigi Auriemma
ORIGINAL ADVISORY:
http://aluigi.altervista.org/adv/wsftpweblog-adv.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200812-0135 | CVE-2008-5693 | Ipswitch WS_FTP Server Manager Etc. WSFTPSVR/ Subordinate custom ASP Vulnerability to read file contents |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Ipswitch WS_FTP Server Manager 6.1.0.0 and earlier, and possibly other Ipswitch products, might allow remote attackers to read the contents of custom ASP files in WSFTPSVR/ via a request with an appended dot character. WS_FTP Server Manager is prone to an authentication-bypass vulnerability and an information-disclosure vulnerability.
An attacker can exploit these issues to gain unauthorized access to the affected application and gain access to potentially sensitive information.
These issues affect WS_FTP Server Manager 6.1.0.0; prior versions may also be affected. Ipswitch WS_FTP Server is a highly secure and easy-to-manage file transfer server
VAR-200803-0324 | CVE-2008-1148 | OpenBSD Used in PRNG Vulnerabilities whose important values are inferred in allegorism |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka "Algorithm A0"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting. A PRNG originating in OpenBSD is prone to a weakness that exposes DNS cache-poisoning and predictable IP ID sequence issues. This issue stems from a flaw in the linear congruential generator (LCG) pseudo-random number generator (PRNG) algorithm. The attacker may also predict IP ID sequences, allowing them to perform OS fingerprinting, network idle-scanning, and potentially TCP blind data-injection attacks.
The BIND 9 server included in OpenBSD 3.3 through to 4.2 is vulnerable to this issue. The vulnerable PRNG algorithm and variants are also used in the IP ID sequence generation in OpenBSD 2.6 through to 4.2.
The vulnerable PRNG has also been ported to other operating systems, including:
Mac OS X and Mac OS X Server 10.0 through to 10.5.1
Darwin 1.0 through to 9.1
FreeBSD 4.4 through to 7.0
NetBSD 1.6.2 through to 4.0
DragonFlyBSD 1.0 through to 1.10.1.
FreeBSD, NetBSD, and DragonFlyBSD are affected only if they enable the PRNG's use through the 'net.inet.ip.random_id' sysctl to 1. This is a nondefault configuration change.
Other operating systems and versions may also be affected.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
OpenBSD DNS Server PRNG Transaction ID Vulnerability
SECUNIA ADVISORY ID:
SA28819
VERIFY ADVISORY:
http://secunia.com/advisories/28819/
CRITICAL:
Moderately critical
IMPACT:
Spoofing
WHERE:
>From remote
OPERATING SYSTEM:
OpenBSD 3.x
http://secunia.com/product/100/
OpenBSD 4.0
http://secunia.com/product/12486/
OpenBSD 4.1
http://secunia.com/product/16044/
OpenBSD 4.2
http://secunia.com/product/16045/
DESCRIPTION:
Amit Klein has reported a vulnerability in OpenBSD, which can be
exploited by malicious people to poison the DNS cache.
The vulnerability is caused due to a weakness within the OpenBSD DNS
server's pseudo random number generator (PRNG). This can be exploited
to obtain the DNS transaction ID and poison the DNS cache.
The vulnerability is reported in OpenBSD versions 3.3 to 4.2.
SOLUTION:
Do not rely on the information returned by an OpenBSD DNS server.
PROVIDED AND/OR DISCOVERED BY:
Amit Klein, Trusteer
ORIGINAL ADVISORY:
http://www.trusteer.com/docs/dnsopenbsd.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200803-0323 | CVE-2008-1147 | OpenBSD Used in PRNG Vulnerabilities whose important values are inferred in allegorism |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka "Algorithm X2"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting. A PRNG originating in OpenBSD is prone to a weakness that exposes DNS cache-poisoning and predictable IP ID sequence issues. This issue stems from a flaw in the linear congruential generator (LCG) pseudo-random number generator (PRNG) algorithm.
An attacker may leverage this issue to manipulate DNS cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks. The attacker may also predict IP ID sequences, allowing them to perform OS fingerprinting, network idle-scanning, and potentially TCP blind data-injection attacks.
The BIND 9 server included in OpenBSD 3.3 through to 4.2 is vulnerable to this issue. The vulnerable PRNG algorithm and variants are also used in the IP ID sequence generation in OpenBSD 2.6 through to 4.2.
The vulnerable PRNG has also been ported to other operating systems, including:
Mac OS X and Mac OS X Server 10.0 through to 10.5.1
Darwin 1.0 through to 9.1
FreeBSD 4.4 through to 7.0
NetBSD 1.6.2 through to 4.0
DragonFlyBSD 1.0 through to 1.10.1.
FreeBSD, NetBSD, and DragonFlyBSD are affected only if they enable the PRNG's use through the 'net.inet.ip.random_id' sysctl to 1. This is a nondefault configuration change.
Other operating systems and versions may also be affected.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
OpenBSD DNS Server PRNG Transaction ID Vulnerability
SECUNIA ADVISORY ID:
SA28819
VERIFY ADVISORY:
http://secunia.com/advisories/28819/
CRITICAL:
Moderately critical
IMPACT:
Spoofing
WHERE:
>From remote
OPERATING SYSTEM:
OpenBSD 3.x
http://secunia.com/product/100/
OpenBSD 4.0
http://secunia.com/product/12486/
OpenBSD 4.1
http://secunia.com/product/16044/
OpenBSD 4.2
http://secunia.com/product/16045/
DESCRIPTION:
Amit Klein has reported a vulnerability in OpenBSD, which can be
exploited by malicious people to poison the DNS cache.
The vulnerability is caused due to a weakness within the OpenBSD DNS
server's pseudo random number generator (PRNG). This can be exploited
to obtain the DNS transaction ID and poison the DNS cache.
The vulnerability is reported in OpenBSD versions 3.3 to 4.2.
SOLUTION:
Do not rely on the information returned by an OpenBSD DNS server.
PROVIDED AND/OR DISCOVERED BY:
Amit Klein, Trusteer
ORIGINAL ADVISORY:
http://www.trusteer.com/docs/dnsopenbsd.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200803-0322 | CVE-2008-1146 | OpenBSD Used in PRNG Vulnerabilities whose important values are inferred in allegorism |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND. A PRNG originating in OpenBSD is prone to a weakness that exposes DNS cache-poisoning and predictable IP ID sequence issues. This issue stems from a flaw in the linear congruential generator (LCG) pseudo-random number generator (PRNG) algorithm. The attacker may also predict IP ID sequences, allowing them to perform OS fingerprinting, network idle-scanning, and potentially TCP blind data-injection attacks.
The BIND 9 server included in OpenBSD 3.3 through to 4.2 is vulnerable to this issue. The vulnerable PRNG algorithm and variants are also used in the IP ID sequence generation in OpenBSD 2.6 through to 4.2.
The vulnerable PRNG has also been ported to other operating systems, including:
Mac OS X and Mac OS X Server 10.0 through to 10.5.1
Darwin 1.0 through to 9.1
FreeBSD 4.4 through to 7.0
NetBSD 1.6.2 through to 4.0
DragonFlyBSD 1.0 through to 1.10.1.
FreeBSD, NetBSD, and DragonFlyBSD are affected only if they enable the PRNG's use through the 'net.inet.ip.random_id' sysctl to 1. This is a nondefault configuration change.
Other operating systems and versions may also be affected.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
OpenBSD DNS Server PRNG Transaction ID Vulnerability
SECUNIA ADVISORY ID:
SA28819
VERIFY ADVISORY:
http://secunia.com/advisories/28819/
CRITICAL:
Moderately critical
IMPACT:
Spoofing
WHERE:
>From remote
OPERATING SYSTEM:
OpenBSD 3.x
http://secunia.com/product/100/
OpenBSD 4.0
http://secunia.com/product/12486/
OpenBSD 4.1
http://secunia.com/product/16044/
OpenBSD 4.2
http://secunia.com/product/16045/
DESCRIPTION:
Amit Klein has reported a vulnerability in OpenBSD, which can be
exploited by malicious people to poison the DNS cache.
The vulnerability is caused due to a weakness within the OpenBSD DNS
server's pseudo random number generator (PRNG). This can be exploited
to obtain the DNS transaction ID and poison the DNS cache.
The vulnerability is reported in OpenBSD versions 3.3 to 4.2.
SOLUTION:
Do not rely on the information returned by an OpenBSD DNS server.
PROVIDED AND/OR DISCOVERED BY:
Amit Klein, Trusteer
ORIGINAL ADVISORY:
http://www.trusteer.com/docs/dnsopenbsd.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200802-0015 | CVE-2008-0043 | Apple iPhoto of Photocast Subscription format string vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Format string vulnerability in Apple iPhoto before 7.1.2 allows remote attackers to execute arbitrary code via photocast subscriptions. iPhoto is prone to a format-string vulnerability. Failed attacks will likely cause denial-of-service conditions.
This issue affects versions prior to iPhoto 7.1.2. iPhoto is a tool for importing, organizing and sharing digital photos.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Apple iPhoto Photocast Format String Vulnerability
SECUNIA ADVISORY ID:
SA28805
VERIFY ADVISORY:
http://secunia.com/advisories/28805/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
Apple iLife iPhoto 7.x
http://secunia.com/product/17471/
DESCRIPTION:
A vulnerability has been reported in Apple iPhoto, which can be
exploited by malicious people to compromise a vulnerable system.
SOLUTION:
Update to iPhoto 7.1.2.
http://www.apple.com/support/downloads/iphoto712.html
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Nathan McFeters, Ernst & Young's Advanced Security
Center.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=307398
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200802-0410 | CVE-2008-0608 | IPSwitch WS_FTP of ftplogsrv.exe Service disruption in (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Logging Server (ftplogsrv.exe) 7.9.14.0 and earlier in IPSwitch WS_FTP 6.1 allows remote attackers to cause a denial of service (loss of responsiveness) via a large number of large packets to port 5151/udp, which causes the listening socket to terminate and prevents log commands from being recorded, a different vulnerability than CVE-2007-3823. IPSwitch WS_FTP of Logging Server (ftplogsrv.exe) There is a service disruption ( Loss of reactivity ) There is a vulnerability that becomes a condition. WS_FTP Log Server shipped with WS_FTP is prone to a remote denial-of-service vulnerability.
Successfully exploiting this issue allows remote attackers to crash the affected application, denying service to legitimate users.
This issue affects WS_FTP running FTP Log Server 7.9.14.0; other versions may also be affected. This vulnerability is different from CVE-2007-3823.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Ipswitch WS_FTP Server FTP Log Server Denial of Service
SECUNIA ADVISORY ID:
SA28761
VERIFY ADVISORY:
http://secunia.com/advisories/28761/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From local network
SOFTWARE:
WS_FTP Server 6.x
http://secunia.com/product/14782/
DESCRIPTION:
Luigi Auriemma has discovered a vulnerability in Ipswitch WS_FTP
Server, which can be exploited by malicious people to cause a DoS
(Denial of Service). This can be exploited to cause the
service to stop responding to further log requests by sending multiple
overly large datagrams (over 4096 bytes) within a short period of time
to port 5151/UDP. Other versions may
also be affected.
SOLUTION:
Restrict access to port 5151/UDP.
PROVIDED AND/OR DISCOVERED BY:
Luigi Auriemma
ORIGINAL ADVISORY:
http://aluigi.altervista.org/adv/ftplogsrvz-adv.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200802-0423 | CVE-2008-0621 |
SAP GUI and SAPSprint include SAPLPD Vulnerable to buffer overflow
Related entries in the VARIoT exploits database: VAR-E-200802-0400, VAR-E-200802-0399 |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges.
Successfully exploiting these issues allows remote attackers to crash the service and potentially to execute arbitrary code. This may facilitate the complete compromise of affected computers.
The following versions are affected:
- SAPlpd as included with SAP GUI 7.10 (and earlier)
- Versions prior to SAPSprint 1018
This issue is reportedly documented in SAP Note 1138934.
PROVIDED AND/OR DISCOVERED BY:
Originally reported in SAPLPD by Luigi Auriemma.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
SAP GUI SAPLPD Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA28786
VERIFY ADVISORY:
http://secunia.com/advisories/28786/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From local network
SOFTWARE:
SAP GUI 7.x
http://secunia.com/product/16959/
DESCRIPTION:
Luigi Auriemma has discovered some vulnerabilities in SAP GUI, which
can be exploited by malicious people to cause a DoS (Denial of
Service) or to potentially compromise a vulnerable system.
1) Multiple boundary errors exist in the SAPLPD server when
processing LPD commands.
Successful exploitation may allow execution of arbitrary code.
2) An error in SAPLPD when processing the 0x53 LPD command code can
be exploited to terminate an affected server. Other versions may also be affected.
SOLUTION:
Restrict access to TCP port 515. The vendor will reportedly release a
patch soon.
PROVIDED AND/OR DISCOVERED BY:
Luigi Auriemma
ORIGINAL ADVISORY:
http://aluigi.altervista.org/adv/saplpdz-adv.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200802-0399 | CVE-2008-0680 | MicroTik RouterOS of SNMPd Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
SNMPd in MikroTik RouterOS 3.2 and earlier allows remote attackers to cause a denial of service (daemon crash) via a crafted SNMP SET request. MikroTik RouterOS is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash an affected router, denying service to legitimate users.
This issue affects versions up to and including RouterOS 3.2.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
RouterOS SNMPd "SNMP SET" Denial of Service Vulnerability
SECUNIA ADVISORY ID:
SA28762
VERIFY ADVISORY:
http://secunia.com/advisories/28762/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From local network
OPERATING SYSTEM:
RouterOS 3.x
http://secunia.com/product/17436/
DESCRIPTION:
ShadOS has reported a vulnerability in RouterOS, which can be
exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error within the processing of
SNMP requests received by the SNMPd server.
The vulnerability is reported in version 3.2.
SOLUTION:
Restrict access to trusted users only.
PROVIDED AND/OR DISCOVERED BY:
ShadOS
ORIGINAL ADVISORY:
http://milw0rm.com/exploits/5054
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200802-0422 | CVE-2008-0620 |
SAP GUI and SAPSprint include SAPLPD Service disruption in (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200802-0400, VAR-E-200802-0399 |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. This may facilitate the complete compromise of affected computers.
The following versions are affected:
- SAPlpd as included with SAP GUI 7.10 (and earlier)
- Versions prior to SAPSprint 1018
This issue is reportedly documented in SAP Note 1138934.
PROVIDED AND/OR DISCOVERED BY:
Originally reported in SAPLPD by Luigi Auriemma.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
SAP GUI SAPLPD Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA28786
VERIFY ADVISORY:
http://secunia.com/advisories/28786/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From local network
SOFTWARE:
SAP GUI 7.x
http://secunia.com/product/16959/
DESCRIPTION:
Luigi Auriemma has discovered some vulnerabilities in SAP GUI, which
can be exploited by malicious people to cause a DoS (Denial of
Service) or to potentially compromise a vulnerable system.
1) Multiple boundary errors exist in the SAPLPD server when
processing LPD commands. This can be exploited to cause buffer
overflows via overly long arguments passed to the LPD commands having
the following codes: 0x01, 0x02, 0x03, 0x04, 0x05, 0x31, 0x32, 0x33,
0x34, and 0x35.
Successful exploitation may allow execution of arbitrary code.
2) An error in SAPLPD when processing the 0x53 LPD command code can
be exploited to terminate an affected server. Other versions may also be affected.
SOLUTION:
Restrict access to TCP port 515. The vendor will reportedly release a
patch soon.
PROVIDED AND/OR DISCOVERED BY:
Luigi Auriemma
ORIGINAL ADVISORY:
http://aluigi.altervista.org/adv/saplpdz-adv.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200802-0496 | CVE-2008-0590 | SSH have Ipswitch WS_FTP Server Vulnerable to buffer overflow |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Buffer overflow in Ipswitch WS_FTP Server with SSH 6.1.0.0 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long opendir command. Ipswitch WS_FTP is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.
An attacker may exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial of service.
This issue affects WS_FTP 6.1.0.0; other versions may also be affected. Progress Software Ipswitch WS_FTP Server is a set of file transfer solutions provided by Progress Software in the United States. It provides functions such as file transfer control and transfer encryption.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
IpSwitch WS_FTP Server with SSH Buffer Overflow Vulnerability
SECUNIA ADVISORY ID:
SA28753
VERIFY ADVISORY:
http://secunia.com/advisories/28753/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From remote
SOFTWARE:
WS_FTP Server 6.x
http://secunia.com/product/14782/
DESCRIPTION:
securfrog has discovered a vulnerability in IpSwitch WS_FTP Server
with SSH, which can be exploited by malicious users to cause a DoS
(Denial of Service) or potentially compromise a vulnerable system.
The vulnerability is caused due to a boundary error in the SSH Server
Service (SSHServer.exe) when handling arguments to the "opendir"
command. This can be exploited to cause a stack-based buffer overflow
by passing an overly long argument to the affected command.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is confirmed in IpSwitch WS_FTP Server with SSH
version 6.1.
SOLUTION:
Grant only trusted users access to the SSH Server Service.
PROVIDED AND/OR DISCOVERED BY:
securfrog
ORIGINAL ADVISORY:
http://www.milw0rm.com/exploits/5044
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200802-0354 | CVE-2008-0565 |
DeltaScripts PHP Links 'vote.php' SQL Injection Vulnerability
Related entries in the VARIoT exploits database: VAR-E-200801-0039, VAR-E-200801-0040 |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
SQL injection vulnerability in vote.php in DeltaScripts PHP Links 1.3 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This issue affects PHP Links 1.3 and prior versions.
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Input passed to the "id" parameter in vote.php is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation allows e.g. retrieving usernames and password
hashes, but requires knowledge of the database table prefix.
The vulnerability is confirmed in version 1.3. Other versions may
also be affected.
SOLUTION:
Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY:
Houssamix
ORIGINAL ADVISORY:
http://milw0rm.com/exploits/5021
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------