Home > Security > Advisories

Advisories

Mandriva Advisories

Package name groff
Date February 7th, 2002
Advisory ID MDKSA-2002:012
Affected versions 7.2, 8.0, 8.1
Synopsis Updated groff packages fix buffer overflow

Problem Description

zen-parse discovered an exploitable buffer overflow in groff's
preprocessor. If groff is invoked using the LPRng printing system, an
attacker can gain rights as the "lp" user. Likewise, this may be
remotely exploitable if lpd is running and remotely accessible and the
attacker knows the name of the printer and it's spool file.

Updated Packages

Mandrakelinux 7.2

 56d6ca492d028660e7358e2af1236e5f  7.2/RPMS/groff-1.16.1-7.2mdk.i586.rpm
1aba691d52d4954e6c4ec330577509e3  7.2/RPMS/groff-for-man-1.16.1-7.2mdk.i586.rpm
2974b9435ff20c60d9db90e3e7942973  7.2/RPMS/groff-gxditview-1.16.1-7.2mdk.i586.rpm
d5ad075b6be3e520dcbb101c6e368955  7.2/RPMS/groff-perl-1.16.1-7.2mdk.i586.rpm
57ac693f4a507a9a9869281fa5e868c0  7.2/SRPMS/groff-1.16.1-7.2mdk.src.rpm

Mandrakelinux 8.0

 69b21ea6f7811e0180b81f5e6e763bff  8.0/RPMS/groff-1.16.1-7.2mdk.i586.rpm
c77033dc0048071b21085bdbd1f899ef  8.0/RPMS/groff-for-man-1.16.1-7.2mdk.i586.rpm
33f5822612914a8b9dc05ce939e3ebd0  8.0/RPMS/groff-gxditview-1.16.1-7.2mdk.i586.rpm
c9f933dfbd2c5b5e312919698621a682  8.0/RPMS/groff-perl-1.16.1-7.2mdk.i586.rpm
57ac693f4a507a9a9869281fa5e868c0  8.0/SRPMS/groff-1.16.1-7.2mdk.src.rpm

Mandrakelinux 8.0/PPC

 3f8cde1fde265be24d7a8da36c3e5b8b  ppc/8.0/RPMS/groff-1.16.1-7.2mdk.ppc.rpm
952284ae71a894a7325b8fe6cabc331b  ppc/8.0/RPMS/groff-for-man-1.16.1-7.2mdk.ppc.rpm
b0f13231c69dd6c50f4da9a6e2f06d2d  ppc/8.0/RPMS/groff-gxditview-1.16.1-7.2mdk.ppc.rpm
f601ba4f903212a67c32f71d8f1e757d  ppc/8.0/RPMS/groff-perl-1.16.1-7.2mdk.ppc.rpm
57ac693f4a507a9a9869281fa5e868c0  ppc/8.0/SRPMS/groff-1.16.1-7.2mdk.src.rpm

Mandrakelinux 8.1

 6cc7c8c5936c4a15dca519219c4f078a  8.1/RPMS/groff-1.17.2-3.3mdk.i586.rpm
c8a8ae0e7848c60b922c8d8326afe01e  8.1/RPMS/groff-for-man-1.17.2-3.3mdk.i586.rpm
23dd6a64b3007bcd6bc3f807f5373462  8.1/RPMS/groff-gxditview-1.17.2-3.3mdk.i586.rpm
a92f47ab6a6d3a46509f3dd0d76ea9e3  8.1/RPMS/groff-perl-1.17.2-3.3mdk.i586.rpm
fdae065cd64b4527919d44dbcf126497  8.1/SRPMS/groff-1.17.2-3.3mdk.src.rpm

Mandrakelinux 8.1/IA64

 3f14c6b7f03bd22b9224e01a49208db2  ia64/8.1/RPMS/groff-1.17.2-3.3mdk.ia64.rpm
a1bf708aba7524d62b37d188fd9b28e3  ia64/8.1/RPMS/groff-for-man-1.17.2-3.3mdk.ia64.rpm
e0a4732b4af728fcf3da51df15193490  ia64/8.1/RPMS/groff-gxditview-1.17.2-3.3mdk.ia64.rpm
efdc1cc2cb3feabbc13b211c62d215d6  ia64/8.1/RPMS/groff-perl-1.17.2-3.3mdk.ia64.rpm
fdae065cd64b4527919d44dbcf126497  ia64/8.1/SRPMS/groff-1.17.2-3.3mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0003

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.