[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : format bug in LPRng

Title: format bug in LPRng
Released by: Caldera
Date: 25th September 2000
Printable version: Click here
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1



______________________________________________________________________________

   Caldera Systems, Inc.  Security Advisory



Subject: format bug in LPRng

Advisory number: CSSA-2000-033.0

Issue date: 2000 September, 25

Cross reference:

______________________________________________________________________________





1. Problem Description



   There is a format bug in the LPRng printer daemon that could

   possibly be exploited to obtain root privilege. This problem

   is particulary severe because it can be exercised remotely.



   We are not aware of any exploits for this bug yet.



2. Vulnerable Versions



   System                       Package

   -----------------------------------------------------------

   OpenLinux Desktop 2.3        All packages previous to

   LPRng-3.5.3-3



   OpenLinux eServer 2.3        All packages previous to

   and OpenLinux eBuilder       LPRng-3.5.3-3



   OpenLinux eDesktop 2.4 All packages previous to

                                LPRng-3.5.3-3



3. Solution



   Workaround:



   None known. The proper solution is to upgrade to the fixed

   packages.



4. OpenLinux Desktop 2.3



   4.1 Location of Fixed Packages



       The upgrade packages can be found on Caldera's FTP site at:



       http://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/



       The corresponding source code package can be found at:



       http://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS



   4.2 Verification



       3ad5e8e8ab42d2ed1cce0627ca2a0f45  RPMS/LPRng-3.5.3-3.i386.rpm

       61f4d3aef6757c68ba73cc1cc8bbcf27  RPMS/LPRng-doc-3.5.3-3.i386.rpm

       ebd7e8ec09ef4d92397f608b1125ff82  RPMS/LPRng-doc-ps-3.5.3-3.i386.rpm

       c53c9a83c0791030297b6079d7b9fcd9  RPMS/LPRng-lpd-3.5.3-3.i386.rpm

       d266aed344873c9ff6aab2a409d760b4  SRPMS/LPRng-3.5.3-3.src.rpm



   4.3 Installing Fixed Packages



       Upgrade the affected packages with the following commands:



  rpm -Fhv LPRng-*.i386.rpm



       Stop and restart the lpd service using



  /etc/rc.d/init.d/lpd stop

  /etc/rc.d/init.d/lpd start



5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0



   5.1 Location of Fixed Packages



       The upgrade packages can be found on Caldera's FTP site at:



       http://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/



       The corresponding source code package can be found at:



       http://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS



   5.2 Verification



       9cb7089adcadcf29ee2cb8268acc46c1  RPMS/LPRng-3.5.3-3.i386.rpm

       77e9edbf336837a9957c3fc62167aee4  RPMS/LPRng-doc-3.5.3-3.i386.rpm

       558a98c48558538bc15f86ca9a555e68  RPMS/LPRng-doc-ps-3.5.3-3.i386.rpm

       62c39c60197447be1b4de85f81bcd5a0  RPMS/LPRng-lpd-3.5.3-3.i386.rpm

       d266aed344873c9ff6aab2a409d760b4  SRPMS/LPRng-3.5.3-3.src.rpm



   5.3 Installing Fixed Packages



       Upgrade the affected packages with the following commands:



  rpm -Fhv LPRng-*.i386.rpm



       Stop and restart the lpd service using



  /etc/rc.d/init.d/lpd stop

  /etc/rc.d/init.d/lpd start



6. OpenLinux eDesktop 2.4



   6.1 Location of Fixed Packages



       The upgrade packages can be found on Caldera's FTP site at:



       http://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/



       The corresponding source code package can be found at:



       http://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS



   6.2 Verification



       7ec1973e306bbcaa3e27b770b463e6fe  RPMS/LPRng-3.5.3-3.i386.rpm

       f373e0a2389c64e207b84293d2afc177  RPMS/LPRng-doc-3.5.3-3.i386.rpm

       4560b0415dc7dbf7bde284173a49c6f6  RPMS/LPRng-doc-ps-3.5.3-3.i386.rpm

       994f2204ba1e743725fe69cecb47dac5  RPMS/LPRng-lpd-3.5.3-3.i386.rpm

       d266aed344873c9ff6aab2a409d760b4  SRPMS/LPRng-3.5.3-3.src.rpm



   6.3 Installing Fixed Packages



       Upgrade the affected packages with the following commands:



  rpm -Fhv LPRng-*.i386.rpm



       Stop and restart the lpd service using



  /etc/rc.d/init.d/lpd stop

  /etc/rc.d/init.d/lpd start



7. References



   This and other Caldera security resources are located at:



   http://www.calderasystems.com/support/security/index.html



   This security fix closes Caldera's internal Problem Report 7877.



8. Disclaimer



   Caldera Systems, Inc. is not responsible for the misuse of any of the

   information we provide on this website and/or through our security

   advisories. Our advisories are a service to our customers intended to

   promote secure installation and use of Caldera OpenLinux.



9. Acknowledgements



   Caldera Systems wishes to thank Chris Evans for finding and

   reporting this bug.



______________________________________________________________________________

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.0.1 (GNU/Linux)

Comment: For info see http://www.gnupg.org



iD8DBQE5z26t18sy83A/qfwRAjkWAJsEORYSmrklimqWj43UvZKGaTD+WACfa63O

rF00C5hA+uS3XuNHIRw6v2A=

=kBzt

-----END PGP SIGNATURE-----








(C) 1999-2000 All rights reserved.