Korean
<< Back
VID 23005
Severity 40
Port 515
Protocol TCP
Class LPD
Detailed Description The line printer daemon (in.lpd) is running on the solaris system. Buffer overflow in the line printer daemon for Solaris 2.8 and earlier allows remote attackers to gain root privileges.
The Solaris BSD print protocol daemon provides an interface for remote users to interact with a local printer. All current versions of Solaris install and enable the in.lpd daemon by default. The in.lpd daemon listens on the network for remote requests on port 515. The in.lpd daemon provides extensive functionality to network users who intend to print documents over a network. There is a flaw in the "transfer job" routine, which may allow attackers to overflow an unchecked buffer. Attackers may exploit this vulnerability to crash the printer daemon, or execute arbitrary code as super user on a target system.

* References:
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?id=advise80
http://www.securityfocus.com/bid/2894
Recommendation Administrators are strongly advised to either apply network access control to the service or disable 'in.lpd'. Sun Microsystems has acknowledged this vulnerability. The patch ID numbers have been made available. The actual patches will reportedly not be downloadable until July 2001.

The patch numbers are listed below:
106235-09 SunOS 5.6: lp patch
106236-09 SunOS 5.6_x86: lp patch
107115-08 SunOS 5.7: LP patch
107116-08 SunOS 5.7_x86: LP patch
109320-04 SunOS 5.8: LP patch
109321-04 SunOS 5.8_x86: LP patch

Until these patches are released, We recommend that the in.lpd daemon be disabled on all vulnerable systems. To disable the in.lpd daemon:
1. Change user to root.
2. Open /etc/inetd.conf in any text editor.
3. Search for the line beginning with "printer".
4. Insert a comment, or "#" character at the beginning of this line.
5. Restart inetd.
Related URL CVE-2001-0353 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)