exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 27743

Secunia Security Advisory 27743
Posted Nov 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for tetex. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose and manipulate sensitive information, and by malicious people to potentially compromise a user's system.

tags | advisory, local, vulnerability
systems | linux, mandriva
SHA-256 | 89c0305f8b9595a42a1526722b1b9b4a10f5b48271946a92dff0381ab18130fb

Secunia Security Advisory 27743

Change Mirror Download


----------------------------------------------------------------------

2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.

Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

----------------------------------------------------------------------

TITLE:
Mandriva update for tetex

SECUNIA ADVISORY ID:
SA27743

VERIFY ADVISORY:
http://secunia.com/advisories/27743/

CRITICAL:
Moderately critical

IMPACT:
Manipulation of data, Exposure of sensitive information, DoS, System
access

WHERE:
>From remote

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/

DESCRIPTION:
Mandriva has issued an update for tetex. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
disclose and manipulate sensitive information, and by malicious
people to potentially compromise a user's system.

For more information:
SA26293
SA27672

SOLUTION:
Apply updated packages.

Mandriva Linux 2007

ade4d0388b150fdd6a4469b69a5a662f
2007.0/i586/jadetex-3.12-116.5mdv2007.0.i586.rpm
de24bfc0d41975bfa92aa8136ddd390b
2007.0/i586/tetex-3.0-18.5mdv2007.0.i586.rpm
d44ef3cb47cc4c3f29d723989e791dc8
2007.0/i586/tetex-afm-3.0-18.5mdv2007.0.i586.rpm
2f29a9263ac09a8e944ccf73e3d26e3a
2007.0/i586/tetex-context-3.0-18.5mdv2007.0.i586.rpm
5fa8b58b9aa974ddffd556c03ca81c6f
2007.0/i586/tetex-devel-3.0-18.5mdv2007.0.i586.rpm
dc551e5b0e5c31ed9cfa8d81599f07be
2007.0/i586/tetex-doc-3.0-18.5mdv2007.0.i586.rpm
3b19a24abea988d76f1ee82c25cb1dee
2007.0/i586/tetex-dvilj-3.0-18.5mdv2007.0.i586.rpm
17d5395be6f65db6777f9d701e35c2ff
2007.0/i586/tetex-dvipdfm-3.0-18.5mdv2007.0.i586.rpm
ec5649686425f62103fd085c57c1c3e6
2007.0/i586/tetex-dvips-3.0-18.5mdv2007.0.i586.rpm
66888feb0b690ac4d6a5c2588b6a5a91
2007.0/i586/tetex-latex-3.0-18.5mdv2007.0.i586.rpm
3cc2a2787ff8dc4364a37dc32f81ba27
2007.0/i586/tetex-mfwin-3.0-18.5mdv2007.0.i586.rpm
0199cabc5d28eb64a6ce78f209c674eb
2007.0/i586/tetex-texi2html-3.0-18.5mdv2007.0.i586.rpm
eb849d14a6242b3d0dcd5f6fb9fc2fd2
2007.0/i586/tetex-xdvi-3.0-18.5mdv2007.0.i586.rpm
109eaf4ad10fcbd4fae5db40ee2aca95
2007.0/i586/xmltex-1.9-64.5mdv2007.0.i586.rpm
1cc715537c77ecfe23117f63b57312ad
2007.0/SRPMS/tetex-3.0-18.5mdv2007.0.src.rpm

Mandriva Linux 2007/X86_64

80fd46f964f0cad564eec96f31bacb8f
2007.0/x86_64/jadetex-3.12-116.5mdv2007.0.x86_64.rpm
d2cae01046967ec4472ad9fed62c7fb6
2007.0/x86_64/tetex-3.0-18.5mdv2007.0.x86_64.rpm
2783f1a16d9dd40d2b70f275167acea2
2007.0/x86_64/tetex-afm-3.0-18.5mdv2007.0.x86_64.rpm
7fef64eb5797ece756800d7ba0a79c69
2007.0/x86_64/tetex-context-3.0-18.5mdv2007.0.x86_64.rpm
25031c27e20a72e6210cde09074060c2
2007.0/x86_64/tetex-devel-3.0-18.5mdv2007.0.x86_64.rpm
bd70360887385b6672d3f96f1e586c7d
2007.0/x86_64/tetex-doc-3.0-18.5mdv2007.0.x86_64.rpm
7a115bd7186675cdab6c4dd5d017cdce
2007.0/x86_64/tetex-dvilj-3.0-18.5mdv2007.0.x86_64.rpm
a6de020558c9c7de6c46ca8e00f9bfdb
2007.0/x86_64/tetex-dvipdfm-3.0-18.5mdv2007.0.x86_64.rpm
13c7ec52d8ad06fe4be336fd8150ed82
2007.0/x86_64/tetex-dvips-3.0-18.5mdv2007.0.x86_64.rpm
fae6d11af04ff51c41f84df96f00a718
2007.0/x86_64/tetex-latex-3.0-18.5mdv2007.0.x86_64.rpm
3c1819f536a007174df5dcd1e5cd62d7
2007.0/x86_64/tetex-mfwin-3.0-18.5mdv2007.0.x86_64.rpm
e12654ecc2a4425ca5c5680a41b8d23d
2007.0/x86_64/tetex-texi2html-3.0-18.5mdv2007.0.x86_64.rpm
03823155acf3450a67f95ed26a1b1fb4
2007.0/x86_64/tetex-xdvi-3.0-18.5mdv2007.0.x86_64.rpm
65471f0bb517d9b48198213bbf867ba6
2007.0/x86_64/xmltex-1.9-64.5mdv2007.0.x86_64.rpm
1cc715537c77ecfe23117f63b57312ad
2007.0/SRPMS/tetex-3.0-18.5mdv2007.0.src.rpm

ORIGINAL ADVISORY:
http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:230

OTHER REFERENCES:
SA26293:
http://secunia.com/advisories/26293/

SA27672:
http://secunia.com/advisories/27672/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close