Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2002:012: groff


Vulnerability Assessment Details

MDKSA-2002:012: groff

Vulnerability Assessment Summary
Check for the version of the groff package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2002:012 (groff).


zen-parse discovered an exploitable buffer overflow in groff's preprocessor. If
groff is invoked using the LPRng printing system, a possible hacker can gain rights as
the 'lp' user. Likewise, this may be remotely exploitable if lpd is running and
remotely accessible and the attacker knows the name of the printer and it's
spool file.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2002:012
Network Security Threat Level: High

Networks Security ID: 3869

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

CyberPowerPC Gamer Ultra Desktop AMD FX Series, 8GB RAM, AMD Radeon RX 460, 1TB
$199.99
CyberPowerPC Gamer Ultra Desktop AMD FX Series, 8GB RAM, AMD Radeon RX 460, 1TB pictureApple iMac A1312 (2011) 27" Core i5-2500S 2.7GHz - 8GB - 1TB - Radeon HD 6770M
$9.99
Apple iMac A1312 (2011) 27Gaming Laptop Sager NP6852 I7 7700hq 8gb DDR4 250Gb Ssd 1TB HDD Gtx 1050 Ti 4gb
$499.99
Gaming Laptop Sager NP6852 I7 7700hq 8gb DDR4 250Gb Ssd 1TB HDD Gtx 1050 Ti 4gb pictureWestern Digital WD10000H1U-00 1TB Backup External Desktop Hard Drive HDD USB 2.0
$19.99
Western Digital WD10000H1U-00 1TB Backup External Desktop Hard Drive HDD USB 2.0 picture


Discussions

No Discussions have been posted on this vulnerability.