search menu icon-carat-right cmu-wordmark

CERT Coordination Center

HP-UX vulnerable to buffer overflow in line printer daemon (rlpdaemon) via crafted print request

Vulnerability Note VU#966075

Original Release Date: 2001-10-16 | Last Revised: 2001-11-09

Overview

The line printer daemon (rlpdaemon) on HP-UX systems enable various clients to share printers over a network. There exists a buffer overflow vulnerability in this daemon that permits remote execution of arbitrary commands with elevated privileges.

Description

A buffer overflow exists in HP-UX's line printer daemon (rlpdaemon) that may allow an intruder to execute arbitrary code with superuser privilege on the target system. The rlpdaemon is installed by default and is active even if it is not being used. An intruder does not need any prior knowledge, or privileges on the target system in order to exploit this vulnerability.

Impact

An intruder can execute arbitrary commands.

Solution

Hewlett-Packard has released HPSBUX0108-163 to address this issue. Please see the vendor statement for instructions and patches.

Vendor Information

966075
 

View all 11 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered and researched by Chris Spencer of Internet Security Systems (ISS). The CERT/CC wishes to thank ISS for the information contained in their advisory.

This document was written by Jason Rafail.

Other Information

CVE IDs: CVE-2001-0668
Severity Metric: 18.75
Date Public: 2001-08-27
Date First Published: 2001-10-16
Date Last Updated: 2001-11-09 17:10 UTC
Document Revision: 9

Sponsored by CISA.