search menu icon-carat-right cmu-wordmark

CERT Coordination Center

BSD Line Printer Daemon vulnerable to buffer overflow via crafted print request

Vulnerability Note VU#274043

Original Release Date: 2001-09-10 | Last Revised: 2001-11-30

Overview

The line printer daemon enables various clients to share printers over a network. There exists a buffer overflow vulnerability in this daemon that permits remote execution of arbitrary commands with elevated privileges.

Description

There is a buffer overflow in several implementations of in.lpd, a BSD line printer daemon. An intruder can send a specially crafted print job to the target and then request a display of the print queue to trigger the buffer overflow. The intruder may be able use this overflow to execute arbitrary commands on the system with superuser privileges.

The line printer daemon must be enabled and configured properly in order for an intruder to exploit this vulnerability. This is, however, trivial as the line printer daemon is commonly enabled to provide printing functionality. In order to exploit the buffer overflow, the intruder must launch his attack from a system that is listed in the "/etc/hosts.equiv" or "/etc/hosts.lpd" file of the target system.

Impact

An intruder can remotely execute arbitrary commands on the system with the privileges of the line printer daemon, usually root or a superuser.

Solution

Apply a patch, if available, from your vendor.

Disable the line printer daemon if there is not a patch available from your vendor.

Vendor Information

274043
 

View all 16 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered and researched by Mark Dowd of Internet Security Systems (ISS). The CERT/CC wishes to thank ISS for the information contained in their advisory.

This document was written by Jason Rafail.

Other Information

CVE IDs: CVE-2001-0670
Severity Metric: 32.22
Date Public: 2001-08-28
Date First Published: 2001-09-10
Date Last Updated: 2001-11-30 14:25 UTC
Document Revision: 12

Sponsored by CISA.