Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2006:038: groff


Vulnerability Assessment Details

MDKSA-2006:038: groff

Vulnerability Assessment Summary
Check for the version of the groff package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2006:038 (groff).



The Trustix Secure Linux team discovered a vulnerability in the groffer
utility, part of the groff package. It created a temporary directory in an
insecure way which permited for the exploitation of a race condition to create
or overwrite files the rights of the user invoking groffer. Likewise,
similar temporary file issues were fixed in the pic2graph and eqn2graph
programs which now use mktemp to create temporary files, as discovered by
Javier Fernandez-Sanguino Pena. The updated packages have been patched to
correct this issue.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

IBM Dx360 M3 System x iDataplex Server Blade 6391-AC1
$99.0
IBM Dx360 M3 System x iDataplex Server Blade 6391-AC1 pictureHP BL460c G7 Blade Server 2x X5670 2.93GHz/ 6-Core /64GB / 2x300GB HDD#5
$199.0
HP BL460c G7 Blade Server 2x X5670 2.93GHz/ 6-Core /64GB / 2x300GB HDD#5 pictureDell PowerEdge R610 Intel Xeon X5647 Processor, 2.93GHz, 12M Cache; 32GB RAM
$50.0
Dell PowerEdge R610 Intel Xeon X5647 Processor, 2.93GHz, 12M Cache; 32GB RAM pictureDell PowerEdge R610; Intel Xeon X5647 Processor, 2.93GHz, 12M Cache; 8GB RAM
$50.0
Dell PowerEdge R610; Intel Xeon X5647 Processor, 2.93GHz, 12M Cache; 8GB RAM picture


Discussions

No Discussions have been posted on this vulnerability.