[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

PISA-08-JAN-00-002



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

              .------------------------------------------------.
              |**** Project Independence Security Advisory ****|
              `-----------* ID: PISA-08-JAN-00-002 *-----------'
                    Issued by: David Webster <cog@seul.org>

Issue Date: 08-JAN-99

Overview: Two security problems in ldp, fixed by upgrading lpr package 

Affected: Independence Release 6.0-0.8

References: RedHat Security Advisory: RHSA-2000:002-01

                                  -=-=-==-=-=-

Detailed Problem Description:

	Two security vulnerabilities exist in the lpd
	(line printer daemon) shipped with the lpr package.
	
	First, authentication was not thorough enough. If a remote user
	was able to control their own DNS so that their IP address resolved
	to the hostname of the print server, access would be granted,
	when it should not be.

	Secondly, it was possible in the control file of a print job
	to specify arguments to sendmail. By careful manipulation of
	control and data files, this could cause sendmail to be executed
	with a user-specified configuration file. This could lead
	very easily to a root compromise.
	
	It is recommended that all users of the	lpr package (which is 
	required to print) upgrade to the fixed packages.


Solution:

        Update the affected RPM packages by downloading and
        installing the RPMs listed below. For each RPM, run:
        
                root# rpm -Fvh <filename>

        where <filename> is the name of the RPM.

        [Note: You need only install EITHER the compiled RPM,
        (*.i386.rpm) OR the source RPM, (*.src.rpm), NOT both.]

RPMs:

  http://independence.seul.org/security/2000/rpms/lpr-0.48-1.i386.rpm
  ftp://updates.redhat.com/6.1/i386/lpr-0.48-1.i386.rpm

Source RPMs:

  http://independence.seul.org/security/2000/rpms/lpr-0.48-1.src.rpm
  ftp://updates.redhat.com/6.1/SRPMS/lpr-0.48-1.src.rpm

Verification:

MD5 sum                           Package Name
- --------------------------------------------------------------------------
78f2220331189e723eab944b53d0710e  i386/lpr-0.48-1.i386.rpm
55c6a740b03569919ec08992257cad96  SRPMS/lpr-0.48-1.src.rpm
- --------------------------------------------------------------------------

These packages are GPG signed by Red Hat, Inc. for security.
Their key is available at: http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

This security advisory, and all future ones should be signed by me,
David Webster (aka cognition), with key ID: 45 FA C2 83

An archive of these messages can be currently be found on:
http://independence.seul.org/security/

A process of automatic retrieval is being worked on.

[Note: these problems were discovered, and fixed by RedHat.]

Thanks also go to DilDog <dildog@l0pht.com> for discovering the vulnerability.

        .---------------------------------------------------.
        | And problems regarding this, or future advisories |
        |      should be emailed to me: <cog@seul.org>      |
        `---------------------------------------------------'
-----BEGIN PGP SIGNATURE-----
Comment: David Webster (aka cogNiTioN) <http://www.cognite.net/>

iD8DBQE4d0SODdLNO0X6woMRAvasAJsExF6n3NHInflOKKYE5x9RfoQ2JACg29WT
dZYZ3wFzeZa7heGXBnxpTqw=
=BbAq
-----END PGP SIGNATURE-----