search menu icon-carat-right cmu-wordmark

CERT Coordination Center

CDE dtprintinfo contains local buffer overflow in Help window via clipboard copy

Vulnerability Note VU#860296

Original Release Date: 2001-12-20 | Last Revised: 2002-04-30

Overview

The CDE Print Viewer program dtprintinfo provides a graphical interface display the status of print queues and print jobs. By using the clipboard to overflow the search field in the Help window of dtprintinfo, a local attacker can execute arbitrary code on the system as root.

Description

There is a buffer overflow in the graphical program used to view print job status in CDE-aware desktop environments. Since dtprintinfo is commonly set to be setuid root, this defect could allow a local attacker to execute arbitrary code as root.

Impact

A user with local access can execute arbitrary code with root privileges.

Solution

Apply a patch from your vendor.

Sun patches:

108949-04: CDE 1.4: libDtHelp/libDtSvc patch
108950-04: CDE 1.4_x86: litDtHelp/libDtSvc patch


Please see other vendor statements for additional patch information.

Workaround

Disable dtprintinfo or 'chmod -s' the binary.

Vendor Information

860296
 
Affected   Unknown   Unaffected

Compaq Computer Corporation

Notified:  March 09, 2001 Updated:  April 30, 2002

Status

  Vulnerable

Vendor Statement

COMPAQ COMPUTER CORPORATION
===============================
x-reference: case id SSRT1-78U

At the time of writing this document, patches(binary kits)
are in progress and final testing is expected to begin soon.
Compaq will provide notice of the completion/availibility
of the patches through AES services (DIA, DSNlink FLASH)
and be available from your normal Compaq Support channel.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Hewlett Packard

Updated:  August 22, 2001

Status

  Vulnerable

Vendor Statement

Please see HPSBUX0105-151: Security Vulnerabilities in CDE on HP-UX at

http://www.itresourcecenter.hp.com/

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

IBM

Notified:  March 01, 2001 Updated:  December 19, 2001

Status

  Vulnerable

Vendor Statement

IBM's AIX operating system is vulnerable.

We have developed official fixes to close this vulnerability.

Customers who run AIX 4.3.x should apply APAR #IY21539.
Customers who run AIX 5.1 should apply APAR #IY20917.

See http://techsupport.services.ibm.com/rs6k/fixdb.html to obtain these APARs.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Open Group

Notified:  August 15, 2001 Updated:  December 17, 2001

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Sun

Updated:  March 05, 2001

Status

  Vulnerable

Vendor Statement

The following patches have been made avaialble:

108949-04: CDE 1.4: libDtHelp/libDtSvc patch
108950-04: CDE 1.4_x86: litDtHelp/libDtSvc patch

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Cray

Updated:  December 20, 2001

Status

  Not Vulnerable

Vendor Statement

UNICOS and UNICOS/mk are not vulnerable to either of these two [issues]. For further information see Cray SPR 721061.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The other issue Cray is responding to is VU#595507.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

SGI

Notified:  March 01, 2001 Updated:  December 17, 2001

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Xi Graphics

Notified:  October 03, 2001 Updated:  December 17, 2001

Status

  Unknown

Vendor Statement

Xi Graphics is investigating this report and will provide more information when it is available.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

The CERT/CC thanks Kevin Kotas of Ernst & Young's eSecurityOnline for reporting this vulnerability to us and to affected vendors.

This document was written by Jeffrey S. Havrilla.

Other Information

CVE IDs: CVE-2001-0551
Severity Metric: 6.75
Date Public: 2001-08-17
Date First Published: 2001-12-20
Date Last Updated: 2002-04-30 18:42 UTC
Document Revision: 14

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.