How to Buy
This script is Copyright (C) 2003-2015 Tenable Network Security, Inc.
The remote host is affected by a remote buffer overflow
The remote bsd-lpd daemon might be vulnerable to a buffer overflow
when sent a too long file name and then asked to show the print queue
when the file is being printed.
An attacker may use this flaw to gain a shell on this host.
** Because of the conditions to positively check for
** this flaw are very hard to meet, this alert might be
** a false positive.
Affected systems : BSD/OS (up to 4.1), FreeBSD (up to 4.2),
NetBSD (up to 1.5.1), OpenBSD (up to 2.9),
SuSE Linux (up to 7.2), SCO Open Server (5.0.6)
Contact your vendor for patches.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false
Family: Gain a shell remotely
Nessus Plugin ID: 11406 (lpd_bsd_overflow.nasl)
Bugtraq ID: 3252
CVE ID: CVE-2001-0670CVE-1999-0061
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.