Secunia Security Advisory - Mandriva has issued an update for a2ps. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
b7e7bebe7f0d12fcd60d0e1d6c0b70081c2934009267ba67a3e7cf80256994a1
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Mandriva update for a2ps
SECUNIA ADVISORY ID:
SA15622
VERIFY ADVISORY:
http://secunia.com/advisories/15622/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
OPERATING SYSTEM:
Mandrakelinux 10.1
http://secunia.com/product/4198/
Mandrake Corporate Server 2.x
http://secunia.com/product/1222/
DESCRIPTION:
Mandriva has issued an update for a2ps. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges.
For more information:
SA13641
SOLUTION:
Apply updated packages.
Mandrakelinux 10.1:
938d5b703cbeb762efd5619880208497
10.1/RPMS/a2ps-4.13b-5.2.101mdk.i586.rpm
e0e7a61ec86b0af969cbe60008e6830f
10.1/RPMS/a2ps-devel-4.13b-5.2.101mdk.i586.rpm
fce5b28393e1c8da6e0ea1ebdb1a2de6
10.1/RPMS/a2ps-static-devel-4.13b-5.2.101mdk.i586.rpm
05f8fdc46bded4e920c709a781c98550
10.1/SRPMS/a2ps-4.13b-5.2.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
fc1fd3817e4f41ea41758a3ac53e86cd
x86_64/10.1/RPMS/a2ps-4.13b-5.2.101mdk.x86_64.rpm
84541cd7d841c64ceccb89f2a413d450
x86_64/10.1/RPMS/a2ps-devel-4.13b-5.2.101mdk.x86_64.rpm
acf595ef3b6f3d2a79204feec3e34208
x86_64/10.1/RPMS/a2ps-static-devel-4.13b-5.2.101mdk.x86_64.rpm
05f8fdc46bded4e920c709a781c98550
x86_64/10.1/SRPMS/a2ps-4.13b-5.2.101mdk.src.rpm
Corporate Server 2.1:
65a7ea65f589533d0aca00a6a37760ff
corporate/2.1/RPMS/a2ps-4.13-14.2.C21mdk.i586.rpm
45c465fc3e2165e6681cccda909fb91f
corporate/2.1/RPMS/a2ps-devel-4.13-14.2.C21mdk.i586.rpm
273f20da1e895043ee719b964b7d2b55
corporate/2.1/RPMS/a2ps-static-devel-4.13-14.2.C21mdk.i586.rpm
58e6bdd04f757728aa63089f8b4249ac
corporate/2.1/SRPMS/a2ps-4.13-14.2.C21mdk.src.rpm
Corporate Server 2.1/X86_64:
d5cc8c0304f537acd89c575c7124a6c0
x86_64/corporate/2.1/RPMS/a2ps-4.13-14.2.C21mdk.x86_64.rpm
ee85486832fbdf9873c3acfa8b73bafe
x86_64/corporate/2.1/RPMS/a2ps-devel-4.13-14.2.C21mdk.x86_64.rpm
84c3ca054e874346bc55daeb5fea0f9f
x86_64/corporate/2.1/RPMS/a2ps-static-devel-4.13-14.2.C21mdk.x86_64.rpm
58e6bdd04f757728aa63089f8b4249ac
x86_64/corporate/2.1/SRPMS/a2ps-4.13-14.2.C21mdk.src.rpm
ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2005:097
OTHER REFERENCES:
SA13641:
http://secunia.com/advisories/13641/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------