First published: Fri Mar 14 2003(Updated: )
Buffer overflow in the lprm command in the lprold lpr package on SuSE 7.1 through 7.3, OpenBSD 3.2 and earlier, and possibly other operating systems, allows local users to gain root privileges via long command line arguments such as (1) request ID or (2) user name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
lprold | =3.0.48 | |
BSD lpr | =0.48 | |
BSD lpr | =2000-05-07 | |
FreeBSD Kernel | =2.2 | |
FreeBSD Kernel | =2.2.2 | |
FreeBSD Kernel | =2.2.3 | |
FreeBSD Kernel | =2.2.4 | |
FreeBSD Kernel | =2.2.5 | |
FreeBSD Kernel | =2.2.6 | |
OpenBSD | =2.0 | |
OpenBSD | =2.1 | |
OpenBSD | =2.2 | |
OpenBSD | =2.3 | |
OpenBSD | =2.4 | |
OpenBSD | =2.5 | |
OpenBSD | =2.6 | |
OpenBSD | =2.7 | |
OpenBSD | =2.8 | |
OpenBSD | =2.9 | |
OpenBSD | =3.0 | |
OpenBSD | =3.1 | |
OpenBSD | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0144 has been assessed as critical because it allows local users to gain root privileges through a buffer overflow.
To fix CVE-2003-0144, update the lpr or lprold package to a version that is not vulnerable.
Systems running affected versions of the lprm command in the lprold package, specifically SuSE 7.1 to 7.3 and OpenBSD 3.2 and earlier, are vulnerable.
CVE-2003-0144 is caused by a buffer overflow due to insufficient validation of command line arguments for user input.
CVE-2003-0144 cannot be exploited remotely; it requires local access to the system.