[<prev] [next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.43.0303051533220.26977-110000@mail.securityfocus.com>
Date: Wed, 5 Mar 2003 15:33:25 -0700 (MST)
From: Dave Ahmad <da@...urityfocus.com>
To: bugtraq@...urityfocus.com
Subject: potential buffer overflow in lprm (fwd)
David Mirza Ahmad
Symantec
"sabbe dhamma anatta"
0x26005712
8D 9A B1 33 82 3D B3 D0 40 EB AB F0 1E 67 C6 1A 26 00 57 12
Return-Path: <owner-security-announce+M30=da=securityfocus.com@...nbsd.org>
Delivered-To: da@...urityfocus.com
Received: (qmail 32695 invoked from network); 5 Mar 2003 22:30:51 -0000
Received: from openbsd.cs.colorado.edu (128.138.192.83)
by mail.securityfocus.com with SMTP; 5 Mar 2003 22:30:51 -0000
Received: from openbsd.org (localhost.cs.colorado.edu [127.0.0.1])
by openbsd.cs.colorado.edu (8.12.7/8.12.5) with ESMTP id h25MRMEa018623
for <da@...urityfocus.com>; Wed, 5 Mar 2003 15:29:44 -0700 (MST)
Received: from xerxes.courtesan.com (courtesan.com [206.168.103.86])
by openbsd.cs.colorado.edu (8.12.8/8.12.5) with ESMTP id h25MQLZN029235
(version=TLSv1/SSLv3 cipher=DHE-DSS-AES256-SHA bits=256 verify=FAIL)
for <security-announce@...nbsd.org>; Wed, 5 Mar 2003 15:26:22 -0700 (MST)
Received: from xerxes.courtesan.com (IDENT:millert@...alhost.courtesan.com [127.0.0.1])
by xerxes.courtesan.com (8.12.8/8.12.6) with ESMTP id h25MQMQs018799
for <security-announce@...nbsd.org>; Wed, 5 Mar 2003 15:26:22 -0700 (MST)
Message-Id: <200303052226.h25MQMQs018799@...xes.courtesan.com>
To: security-announce@...nbsd.org
Subject: potential buffer overflow in lprm
Date: Wed, 05 Mar 2003 15:26:22 -0700
From: "Todd C. Miller" <Todd.Miller@...rtesan.com>
X-Loop: security-announce@...nbsd.org
Precedence: list
Sender: owner-security-announce@...nbsd.org
A bounds check that was added to lprm in 1996 does its checking too
late to be effective. Because of the insufficient check, it may
be possible for a local user to exploit lprm to gain elevated
privileges. It is not know at this time whether or not the bug is
actually exploitable.
Starting with OpenBSD 3.2, lprm is setuid user daemon which limits
the impact of the bug. OpenBSD 3.1 and below however, ship with
lprm setuid root so this is a potential localhost root hole on older
versions of OpenBSD.
The bug is fixed in OpenBSD-current as well as the 3.2 and 3.1
-stable branches.
Patch for OpenBSD 3.1:
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/023_lprm.patch
Patch for OpenBSD 3.2:
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/010_lprm.patch
Thanks go to Arne Woerner for noticing this bug.
Powered by blists - more mailing lists