Synopsis
The remote host is missing a vendor-supplied security patch
Description
The remote host is missing the patch for the advisory SUSE-SA:2002:040 (lprng, html2ps).
The lprng package contains the 'runlpr' program which allows the lp user to execute the lpr program as root. Local attackers can pass certain commandline arguments to lpr running as root, fooling it to execute arbitrary commands as root. This has been fixed.
Note that this vulnerability can only be exploited if the attacker has previously gained access to the lp account.
Additionally, the html2ps printfilter, which is installed as part of the LPRng print system, allowed remote attackers to execute arbitrary commands in the context of the lp user.
These two issues combined allow attackers to mount a remote root attack.
As a workaround, we recommend to uninstall the html2ps package, and restrict access to your print services to authorized hosts only.
Access control to lpd is implemented by adding appropriate entries to the /etc/lpd.perms file. Please consult the lpd.perms(5) manpage, or add the single line
DEFAULT REJECT
to your /etc/lpd.perms file to deny access to everyone from the outside.
Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply the update.
Solution
http://www.suse.de/security/2002_040_lprng_html2ps.html
Plugin Details
File Name: suse_SA_2002_040.nasl
Agent: unix
Supported Sensors: Nessus Agent, Nessus
Vulnerability Information
Required KB Items: Host/SuSE/rpm-list