Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2003:054: man


Vulnerability Assessment Details

MDKSA-2003:054: man

Vulnerability Assessment Summary
Check for the version of the man package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2003:054 (man).


A difficult to exploit vulnerability was discovered in versions of man prior to
1.5l. A bug exists in man that could cause a program named 'unsafe' to be
executed due to a malformed man file. In order to exploit this bug, a local
attacker would have to be able to get another user to read the malformed man
file, and the attacker would also have to create a file called 'unsafe' that
would be located somewhere in the victim's path.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:054
Network Security Threat Level: High

Networks Security ID: 7066

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Lot of 2 Computer Punch Cards, IBM 80-Column Format, Mainframe/Mini, Punched
$2.95
Lot of 2 Computer Punch Cards, IBM 80-Column Format, Mainframe/Mini, Punched pictureWang 2110A Terminal
$835.0
Wang 2110A Terminal pictureVTG HP MEMOREX 30333A COMPUTER MAGNETIC DISC MAINFRAME - SEE PICTURES
$115.31
VTG HP MEMOREX 30333A COMPUTER MAGNETIC DISC MAINFRAME - SEE PICTURES  pictureComputone Systems SST Teletype Computer Mainframe Portable Briefcase Terminal
$120.0
Computone Systems SST Teletype Computer Mainframe Portable Briefcase Terminal picture


Discussions

No Discussions have been posted on this vulnerability.