Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » MDKSA-2002:012: groff

MDKSA-2002:012: groff

by Nikola Strahija on February 8th, 2002 zen-parse discovered an exploitable buffer overflow in groff's preprocessor. If groff is invoked using the LPRng printing system, an attacker can gain rights as the "lp" user. Likewise, this may be remotely exploitable if lpd is running and remotely accessible and the attacker knows the name of the printer and it's spool file.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0003
________________________________________________________________________

Updated Packages:

Linux-Mandrake 7.2:
56d6ca492d028660e7358e2af1236e5f 7.2/RPMS/groff-1.16.1-7.2mdk.i586.rpm
1aba691d52d4954e6c4ec330577509e3 7.2/RPMS/groff-for-man-1.16.1-7.2mdk.i586.rpm
2974b9435ff20c60d9db90e3e7942973 7.2/RPMS/groff-gxditview-1.16.1-7.2mdk.i586.rpm
d5ad075b6be3e520dcbb101c6e368955 7.2/RPMS/groff-perl-1.16.1-7.2mdk.i586.rpm
57ac693f4a507a9a9869281fa5e868c0 7.2/SRPMS/groff-1.16.1-7.2mdk.src.rpm

Mandrake Linux 8.0:
69b21ea6f7811e0180b81f5e6e763bff 8.0/RPMS/groff-1.16.1-7.2mdk.i586.rpm
c77033dc0048071b21085bdbd1f899ef 8.0/RPMS/groff-for-man-1.16.1-7.2mdk.i586.rpm
33f5822612914a8b9dc05ce939e3ebd0 8.0/RPMS/groff-gxditview-1.16.1-7.2mdk.i586.rpm
c9f933dfbd2c5b5e312919698621a682 8.0/RPMS/groff-perl-1.16.1-7.2mdk.i586.rpm
57ac693f4a507a9a9869281fa5e868c0 8.0/SRPMS/groff-1.16.1-7.2mdk.src.rpm

Mandrake Linux 8.0/ppc:
3f8cde1fde265be24d7a8da36c3e5b8b ppc/8.0/RPMS/groff-1.16.1-7.2mdk.ppc.rpm
952284ae71a894a7325b8fe6cabc331b ppc/8.0/RPMS/groff-for-man-1.16.1-7.2mdk.ppc.rpm
b0f13231c69dd6c50f4da9a6e2f06d2d ppc/8.0/RPMS/groff-gxditview-1.16.1-7.2mdk.ppc.rpm
f601ba4f903212a67c32f71d8f1e757d ppc/8.0/RPMS/groff-perl-1.16.1-7.2mdk.ppc.rpm
57ac693f4a507a9a9869281fa5e868c0 ppc/8.0/SRPMS/groff-1.16.1-7.2mdk.src.rpm

Mandrake Linux 8.1:
6cc7c8c5936c4a15dca519219c4f078a 8.1/RPMS/groff-1.17.2-3.3mdk.i586.rpm
c8a8ae0e7848c60b922c8d8326afe01e 8.1/RPMS/groff-for-man-1.17.2-3.3mdk.i586.rpm
23dd6a64b3007bcd6bc3f807f5373462 8.1/RPMS/groff-gxditview-1.17.2-3.3mdk.i586.rpm
a92f47ab6a6d3a46509f3dd0d76ea9e3 8.1/RPMS/groff-perl-1.17.2-3.3mdk.i586.rpm
fdae065cd64b4527919d44dbcf126497 8.1/SRPMS/groff-1.17.2-3.3mdk.src.rpm

Mandrake Linux 8.1/ia64:
3f14c6b7f03bd22b9224e01a49208db2 ia64/8.1/RPMS/groff-1.17.2-3.3mdk.ia64.rpm
a1bf708aba7524d62b37d188fd9b28e3 ia64/8.1/RPMS/groff-for-man-1.17.2-3.3mdk.ia64.rpm
e0a4732b4af728fcf3da51df15193490 ia64/8.1/RPMS/groff-gxditview-1.17.2-3.3mdk.ia64.rpm
efdc1cc2cb3feabbc13b211c62d215d6 ia64/8.1/RPMS/groff-perl-1.17.2-3.3mdk.ia64.rpm
fdae065cd64b4527919d44dbcf126497 ia64/8.1/SRPMS/groff-1.17.2-3.3mdk.src.rpm

Single Network Firewall 7.2:
56d6ca492d028660e7358e2af1236e5f snf7.2/RPMS/groff-1.16.1-7.2mdk.i586.rpm
1aba691d52d4954e6c4ec330577509e3 snf7.2/RPMS/groff-for-man-1.16.1-7.2mdk.i586.rpm
57ac693f4a507a9a9869281fa5e868c0 snf7.2/SRPMS/groff-1.16.1-7.2mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

________________________________________________________________________

To upgrade automatically, use MandrakeUpdate. The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of
FTP mirrors can be obtained from:

http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package. You can do this with the command:

rpm --checksig

All packages are signed by MandrakeSoft for security. You can obtain
the GPG public key of the Mandrake Linux Security Team from:

https://www.mandrakesecure.net/RPM-GPG-KEYS

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other update advisories for Mandrake Linux at:

http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained by
visiting:

http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

[email protected]
________________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team




Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »