Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in a2ps
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in a2ps
ID: MDVSA-2014:076
Distribution: Mandriva
Plattformen: Mandriva Business Server 1.0
Datum: Fr, 11. April 2014, 09:06
Referenzen: http://advisories.mageia.org/MGASA-2014-0161.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466
Applikationen: a2ps

Originalnachricht

This is a multi-part message in MIME format...

------------=_1397155184-7951-7

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:076
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : a2ps
Date : April 10, 2014
Affected: Business Server 1.0
_______________________________________________________________________

Problem Description:

Updated a2ps packages fix security vulnerability:

Brian M. Carlson reported that a2ps's fixps script does not invoke gs
with the -dSAFER option. Consequently executing fixps on a malicious
PostScript file could result in files being deleted or arbitrary
commands being executed with the privileges of the user running fixps
(CVE-2014-0466).
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466
http://advisories.mageia.org/MGASA-2014-0161.html
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 1/X86_64:
0f667f19c4473c76c7f0bb883b018686 mbs1/x86_64/a2ps-4.14-13.1.mbs1.x86_64.rpm
84621cd5370ef5f670042b56e752f3a6
mbs1/x86_64/a2ps-devel-4.14-13.1.mbs1.x86_64.rpm
8cb69125b529ae6be772e21cc24aad6c
mbs1/x86_64/a2ps-static-devel-4.14-13.1.mbs1.x86_64.rpm
f46a477d2bfcb3fe38349c8256b9f25e mbs1/SRPMS/a2ps-4.14-13.1.mbs1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTRrqjmqjQ0CJFipgRAgmCAKC4PtpHXlwrHoM3TEAQ67V3WoJ4CACg7zq7
RgyhNpgqUfqJHiJwpWa0Lno=
=u5/C
-----END PGP SIGNATURE-----


------------=_1397155184-7951-7
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1397155184-7951-7--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung