First published: Fri Aug 31 2001(Updated: )
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =7.0 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1002 has a moderate severity rating due to the potential for privilege escalation through a vulnerable print filter.
To fix CVE-2001-1002, configure the dvips filter to run in secure mode or upgrade to a version of Red Hat Linux that addresses this vulnerability.
CVE-2001-1002 affects Red Hat Linux versions 6.2, 7.0, and 7.1.
The risk associated with CVE-2001-1002 is that remote attackers can execute arbitrary commands with elevated privileges by sending malicious DVI files.
While CVE-2001-1002 is a legacy vulnerability, it remains relevant for organizations running outdated versions of Red Hat Linux.