Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN51-1 : tetex-bin vulnerability


Vulnerability Assessment Details

USN51-1 : tetex-bin vulnerability

Vulnerability Assessment Summary
tetex-bin vulnerability

Detailed Explanation for this Vulnerability Assessment

Summary :

These remote packages are missing security patches :
- libkpathsea-dev
- libkpathsea3
- tetex-bin


Description :

Javier Fernández-Sanguino Peña noticed that "xdvizilla", an auxiliary
script to integrate DVI file viewing in Mozilla-based browsers,
created temporary files and directories in an insecure manner. This
could permit a symbolic link attack to create or overwrite arbitrary
files with the rights of the user invoking the program.

Solution :

Upgrade to :
- libkpathsea-dev-2.0.2-21ubuntu0.4 (Ubuntu 4.10)
- libkpathsea3-2.0.2-21ubuntu0.4 (Ubuntu 4.10)
- tetex-bin-2.0.2-21ubuntu0.4 (Ubuntu 4.10)



Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi

Cables, Connectors

Wavlink USB 3.1 HDD SATA External Hard Drive Disk Enclosure Case Support UASP
$19.99
Wavlink USB 3.1 HDD SATA External Hard Drive Disk Enclosure Case Support UASP picturecomputer parts bundle (motherboard,cpu,gpu,power supply,hard drive,dvdrom)
$74.4
computer parts bundle (motherboard,cpu,gpu,power supply,hard drive,dvdrom) pictureDell Latitude E5430 Core i5 3320 2.6ghz, No Ram or Hard Drive, DVD-RW, See Pics
$49.99
Dell Latitude E5430 Core i5 3320 2.6ghz, No Ram or Hard Drive, DVD-RW, See Pics picture


Discussions

No Discussions have been posted on this vulnerability.