Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2001:058: ispell Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the ispell package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2001:058 (ispell).
The ispell program uses mktemp() to open temporary files. This makes it
vulnerable to symlink attacks. The program now has a patch from OpenBSD applied
that uses mkstemp() instead, and switches gets() to fgets() for dealing with
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2001:058
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.