BSD in.lpd File Name Handling Remote Overflow

high Nessus Plugin ID 11406

Language:

Synopsis

The remote host is affected by a remote buffer overflow vulnerability.

Description

The remote bsd-lpd daemon might be vulnerable to a buffer overflow when sent a too long file name and then asked to show the print queue when the file is being printed.

An attacker may use this flaw to gain a shell on this host.

** Because of the conditions to positively check for
** this flaw are very hard to meet, this alert might be
** a false positive.

Affected systems : BSD/OS (up to 4.1), FreeBSD (up to 4.2), NetBSD (up to 1.5.1), OpenBSD (up to 2.9), SuSE Linux (up to 7.2), SCO Open Server (5.0.6)

Solution

Contact your vendor for patches.

Plugin Details

Severity: High

ID: 11406

File Name: lpd_bsd_overflow.nasl

Version: 1.17

Type: remote

Published: 3/17/2003

Updated: 7/14/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 8/29/2001

Reference Information

CVE: CVE-1999-0061, CVE-2001-0670

BID: 3252