Red Hat Linux 7.0 RHSA-2000:065-04 critical: LPRng string issue
Summary
Summary
LPRng has a string format bug in the use_syslog function. This functionreturns user input in a string that is passed to the syslog() function asthe format string. It is possible to corrupt the print daemon's executionwith unexpected format specifiers, thus gaining root access to thecomputer. The vulnerability is theoretically exploitable both locally andremotely.
Solution
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed ( for more info):
17756 - Critical security hole in LPRng, remote root
6. RPMs required:
Red Hat Linux 7.0:
i386:
sources:
7. Verification:
MD5 sum Package Name
c1fc795122b067dd9549aceb75bf5694 7.0/SRPMS/LPRng-3.6.24-2.src.rpm
05251e71ae5f2d2fdbc6611eea6f8651 7.0/i386/LPRng-3.6.24-2.i386.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
You can verify each package with the following command:
rpm --checksig
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg
References
Originally reported to bugtraq by Chris Evans <chris@scary.beasts.org> on 25 Sep, 2000. Copyright(c) 2000 Red Hat, Inc. `
Package List
Topic
Topic
LPRng has a string format bug in the use_syslog function which could lead
to root compromise.
Relevant Releases Architectures
Red Hat Linux 7.0 - i386
Bugs Fixed