Vulnerability Note VU#638011

HP-UX Line Printer Daemon Vulnerable to Directory Traversal

Original Release date: 21 Nov 2001 | Last revised: 06 Dec 2001

Overview

A remotely exploitable directory traversal vulnerability exists in the HP-UX line printer daemon.

Description

The line printer daemon (rlpdaemon) enables various clients to share printers over a network. By sending a specially crafted print request to an HP-UX host running the rlpdaemon, a local or remote attacker can create arbitrary files or directories on the target host. Intruders may find this vulnerability attractive to exploit because the line printer daemon is enabled by default to provide printing services.

Impact

An attacker may be able to execute arbitrary code on the target system with the privileges of the line printer daemon, typically superuser.

Solution

Contact HP for patches.

Workaround

Disable the line printer daemon until a patch can be applied.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
HPAffected-21 Nov 2001
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was discovered and researched by Mark Dowd and Kris Hunt of Internet Security Systems (ISS). The CERT/CC thanks ISS for the information contained in their advisory.

This document was written by Ian A. Finlay.

Other Information

  • CVE IDs: CAN-2001-0817
  • CERT Advisory: CA-2001-32
  • Date Public: 20 Nov 2001
  • Date First Published: 21 Nov 2001
  • Date Last Updated: 06 Dec 2001
  • Severity Metric: 41.01
  • Document Revision: 44

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.