Executive Summary

Summary
Title New rlpr packages fix multiple vulnerabilities
Informations
Name DSA-524 First vendor Publication 2004-06-19
Vendor Debian Last vendor Modification 2004-06-19
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

jaguar@felinemenace.org discovered a format string vulnerability in rlpr, a utility for lpd printing without using /etc/printcap. While investigating this vulnerability, a buffer overflow was also discovered in related code. By exploiting one of these vulnerabilities, a local or remote user could potentially cause arbitrary code to be executed with the privileges of 1) the rlprd process (remote), or 2) root (local).

CAN-2004-0393: format string vulnerability via syslog(3) in msg() function in rlpr

CAN-2004-0454: buffer overflow in msg() function in rlpr

For the current stable distribution (woody), this problem has been fixed in version 2.02-7woody1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you update your rlpr package.

Original Source

Url : http://www.debian.org/security/2004/dsa-524

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 524-1 (rlpr)
File : nvt/deb_524_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
7195 rlpr msg() Format String Error

rlpr contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered due to a format string error in the msg() function. This flaw may lead to a loss of integrity.
7194 rlpr msg() Overflow

A remote/local overflow exists in rlpr. The msg() function fails to properly check bounds resulting in a buffer overflow. With a specially crafted request, an attacker can execute arbitrary code with the privileges of either the rlprd process or root, resulting in a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-524.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:33:22
  • Multiple Updates