Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2001:086: tetex


Vulnerability Assessment Details

MDKSA-2001:086: tetex

Vulnerability Assessment Summary
Check for the version of the tetex package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2001:086 (tetex).


A problem was discovered in the temporary file handling capabilities of some
teTeX filters by zen-parse. These filters are used as print filters
automatically when printing .dvi files using lpr. This can lead to elevated
rights. This update relies on the updated mktemp packages for 7.x in
MDKA-2001:021, which gives mktemp the ability to create temporary directories.
8.x users already have a mktemp that works in this fashion.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2001:086
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Vintage Apple Macintosh Plus 1MB M0001A Desktop Computer - Working Condition
$199.0
Vintage Apple Macintosh Plus 1MB M0001A Desktop Computer - Working Condition  pictureWorking Apple IIe Vintage Computer
$99.99
Working Apple IIe Vintage Computer pictureApple Macintosh ● Vintage Game ● THE PUZZLE GALLERY ● AT THE CARNIVAL
$6.99
Apple Macintosh ● Vintage Game ● THE PUZZLE GALLERY ● AT THE CARNIVAL pictureApple Power Mac G4 Vintage Computer M5183 No HDD No Optical Drive
$75.0
Apple Power Mac G4 Vintage Computer M5183 No HDD No Optical Drive picture


Discussions

No Discussions have been posted on this vulnerability.