Linux Today: Linux News On Internet Time.





More on LinuxToday


Gentoo Linux Advisories: tetex, groff

Oct 20, 2002, 22:50 (0 Talkback[s])

- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200210-004
- - --------------------------------------------------------------------

PACKAGE : tetex
SUMMARY : Command execution vulnerability in dvips
EXPLOIT : local & remote
DATE    : 2002-10-18 22:00 UTC

- - --------------------------------------------------------------------

Olaf Kirch of SuSE has discovered a vulnerability in dvips that
allowed remote users with printing access to execute command as the 
lp user by sending carefully crafted printjobs. 

SOLUTION

It is recommended that all Gentoo Linux users who are running
app-text/tetex-1.0.7-r10 and earlier update their systems
as follows:

emerge rsync
emerge tetex
emerge clean

- - --------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz
- - --------------------------------------------------------------------


- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200210-005
- - --------------------------------------------------------------------

PACKAGE : groff
SUMMARY : buffer overflow
DATE    : 2002-10-19 19:30 UTC

- - --------------------------------------------------------------------

The groff preprocessor contains an exploitable buffer overflow. If 
groff can be invoked within the LPRng printing system, an attacker 
can gain rights as the "lp" user.

Remote exploitation may be possible if lpd is running and is accessible
remotely, and the attacker knows the name of the printer and spoolfile.

SOLUTION

It is recommended that all Gentoo Linux users who are running
sys-apps/groff-1.17.2-r2 and earlier update their systems
as follows:

emerge rsync
emerge groff
emerge clean

- - --------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz
- - --------------------------------------------------------------------