[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200605261944.k4QJi1Z3030655@lambchop.rdu.rpath.com>
Date: Fri, 26 May 2006 15:44:01 -0400
From: "Justin M. Forbes" <jmforbes@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: rPSA-2006-0083-1 enscript
rPath Security Advisory: 2006-0083-1
Published: 2006-05-26
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
Local Deterministic Weakness
Updated Versions:
enscript=/conary.rpath.com@rpl:devel//1/1.6.1-8.2-1
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1186
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1185
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1184
http://bugs.rpath.com/show_bug.cgi?id=1169
Description:
Previous versions of the enscript package have weaknesses that
may enable vulnerabilities in other applications; in particular,
some print filters may call enscript while allowing the user to
provide arbitrary filenames or options.
The print filters in rPath Linux do not expose these weaknesses
in enscript, and rPath is not aware of any other uses of enscript
in rPath Linux that would create actual vulnerabilities based on
these weaknesses in enscript.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists