Korean
<< Back
VID 23006
Severity 40
Port 515
Protocol TCP
Class LPD
Detailed Description The lpd server calls dvips in insecure mode. An attacker may use this flaw to execute arbitrary
commands remotely on the affected host.
'dvips' is a utility that converts DVI documents to PostScript. It is an optional component of the TeTeX text formatting package. When installed on a system where LPRnG and TeTeX are in use, 'dvips' will be invoked by 'lpd' when a DVI document is to be printed if a printfilter exists for it.
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands.

* References:
http://www.securityfocus.com/bid/3241
http://www.redhat.com/support/errata/RHSA-2001-102.html

Affected Platforms:
RedHat Linux 6.2
RedHat Linux 7.0
RedHat Linux 7.1
Recommendation A workaround is to modify the entry in the printfilters file for DVI documents.

On Red Hat systems, edit the file /usr/lib/rhs/rhs-printfilters/dvi-to-ps.fpi
and change the line that specifies how 'dvips' is to be executed from:

dvips -f $DVIPS_OPTIONS < $TMP_FILE
To:
dvips -R -f $DVIPS_OPTIONS < $TMP_FILE

The '-R' parameter will run 'dvips' in secure mode.
Related URL CVE-2001-1002 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)