Short Name |
OS:LINUXX86:LPRNG-OF |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
OS |
Keywords |
Linux x86 LPRng Buffer Overflow |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in LPRng, an implementation of the Berkeley lpr print spooling utility for LINUX. The LPRng use_syslog() function returns user input to a string that is passed to syslog() as the format string. Attackers can send maliciously formed requests to corrupt execution flow.
LPRng is an implementation of the Berkeley lpr print spooling utility. LPRng contains a function, use_syslog(), that returns user input to a string in LPRng that is passed to syslog() as the format string. As a result, it is possible to corrupt the program's flow of execution by entering malicious format specifiers. In testing this has been exploited to remotely elevate privileges. This vulnerability was tested on RedHat 7.0. Earlier versions are likely also be vulnerable, as well as other operating systems which ship with LPRng. (Please see http://www.redhat.com/support/errata/RHSA-2000-065-06.html for links to updated i386 and source packages.) If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.