First published: Fri Oct 25 1996(Updated: )
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =5.3 | |
SGI IRIX | =6.0.1 | |
SGI IRIX | =6.1 | |
SGI IRIX | =5.0.1 | |
SGI IRIX | =5.1.1 | |
SGI IRIX | =6.4 | |
SGI IRIX | =5.0 | |
SGI IRIX | =5.1 | |
SGI IRIX | =5.2 | |
SGI IRIX | =6.0 | |
SGI IRIX | =6.3 | |
SGI IRIX | =6.2 | |
Sun SunOS | =4.1.4 | |
next nextstep | =4.0 | |
FreeBSD FreeBSD | =2.0.5 | |
bsdi bsd os | =2.1 | |
FreeBSD FreeBSD | =2.1.0 | |
next nextstep | =4.1 | |
Sun SunOS | =4.1.3u1 | |
FreeBSD FreeBSD | =2.1.5 | |
FreeBSD FreeBSD | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0032 is rated as a high severity vulnerability due to its potential for local users to execute arbitrary code as root.
To fix CVE-1999-0032, update the affected lpr software to a version that has patched the buffer overflow vulnerability.
CVE-1999-0032 affects various BSD-based systems, including specific versions of SGI IRIX, SunOS, and FreeBSD.
CVE-1999-0032 cannot be exploited remotely as it requires local access to execute the vulnerable command.
Local users on systems with the vulnerable lpr command can be affected by CVE-1999-0032.