The CDE Print Viewer program dtprintinfo provides a graphical interface display the status of print queues and print jobs. By using the clipboard to overflow the search field in the Help window of dtprintinfo, a local attacker can execute arbitrary code on the system as root.
There is a buffer overflow in the graphical program used to view print job status in CDE-aware desktop environments. Since dtprintinfo is commonly set to be setuid root, this defect could allow a local attacker to execute arbitrary code as root.
A user with local access can execute arbitrary code with root privileges.
Apply a patch from your vendor.
Disable dtprintinfo or 'chmod -s' the binary.
The CERT/CC thanks Kevin Kotas of Ernst & Young's eSecurityOnline for reporting this vulnerability to us and to affected vendors.
This document was written by Jeffrey S. Havrilla.
|Date First Published:||2001-12-20|
|Date Last Updated:||2002-04-30 18:42 UTC|