Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2002:012: groff


Vulnerability Assessment Details

MDKSA-2002:012: groff

Vulnerability Assessment Summary
Check for the version of the groff package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2002:012 (groff).


zen-parse discovered an exploitable buffer overflow in groff's preprocessor. If
groff is invoked using the LPRng printing system, a possible hacker can gain rights as
the 'lp' user. Likewise, this may be remotely exploitable if lpd is running and
remotely accessible and the attacker knows the name of the printer and it's
spool file.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2002:012
Network Security Threat Level: High

Networks Security ID: 3869

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Arista DCS-7508E Switch Chassis with 2xArista 7500E-SUP/4xArista 7500E-36Q-LC
$35000.0
Arista DCS-7508E Switch Chassis with 2xArista 7500E-SUP/4xArista 7500E-36Q-LC pictureDELL POWEREDGE M620 BLADE TWO E5-2620V2 2.10GHZ 96GB 1.8TB 10K SAS H310
$1659.0
DELL POWEREDGE M620 BLADE TWO E5-2620V2 2.10GHZ 96GB 1.8TB 10K SAS H310 pictureDELL POWEREDGE M620 BLADE E5-2650LV2 1.70GHZ 64GB 2 X 600GB 15K SAS H710P
$2009.0
DELL POWEREDGE M620 BLADE E5-2650LV2 1.70GHZ 64GB 2 X 600GB 15K SAS H710P pictureDELL POWEREDGE M620 BLADE E5-2630LV2 2.40GHZ 8GB 2 X 300GB 15K SAS H710P
$1349.0
DELL POWEREDGE M620 BLADE E5-2630LV2 2.40GHZ 8GB 2 X 300GB 15K SAS H710P picture


Discussions

No Discussions have been posted on this vulnerability.