Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2001:048: cups


Vulnerability Assessment Details

MDKSA-2001:048: cups

Vulnerability Assessment Summary
Check for the version of the cups package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2001:048 (cups).


The version of cups shipped with Linux-Mandrake 8.0 has a problem where when a
user prints a multi-page PostScript file with embedded pictures, the pages
following the first with the picture are all printed on the same page, one on
top of the other. From multi-page Abiword files (only text) only the last page
is printed. This update resolves this bug. As well, the upstream 1.1.7 release
of cups fixes some security issues.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2001:048
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Very Rare TIME AND MAGIK Amiga Game by Datasoft EXCELLENT
$49.95
Very Rare TIME AND MAGIK Amiga Game by Datasoft EXCELLENT pictureGenuine Commodore Amiga A2000 System Schematics
$79.0
Genuine Commodore Amiga A2000 System Schematics pictureRoad Rash For Commodore Amiga, NEW / SEALED, EA Electronic Arts
$24.75
Road Rash For Commodore Amiga, NEW / SEALED, EA Electronic Arts pictureVintage Commodore Amiga 1000 Personal Computer.with Original Box And Accessories
$162.5
Vintage Commodore Amiga 1000 Personal Computer.with Original Box And Accessories picture


Discussions

No Discussions have been posted on this vulnerability.