This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
A buffer overflow was discovered in the ParseCommand function in the
hpgltops utility. An attacker with the ability to send malicious HPGL
files to a printer could possibly execute arbitrary code as the 'lp'
Vulnerabilities in the lppasswd utility were also discovered. The
program ignores write errors when modifying the CUPS passwd file. A
local user who is able to fill the associated file system could
corrupt the CUPS passwd file or prevent future use of lppasswd
(CVE-2004-1268 and CVE-2004-1269). As well, lppasswd does not verify
that the passwd.new file is different from STDERR, which could allow a
local user to control output to passwd.new via certain user input that
could trigger an error message (CVE-2004-1270).
The updated packages have been patched to prevent these problems.
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.5
Family: Mandriva Local Security Checks
Nessus Plugin ID: 16184 (mandrake_MDKSA-2005-008.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now