Vulnerability Bulletins |
Ejecución remota de código con privilegios del usuario lp |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Obtener acceso |
Dificulty | Avanzado |
Required attacker level | Acceso remoto sin cuenta a un servicio estandar |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software |
Debian Linux 2.2 (Potato), 3.0 (Woody) SuSE Linux 7.0, 7.1, 7.2, 7.3, 8.0, 8.1 |
Description |
|
Se ha descubierto una vulnerabilidad en el filtro html2ps, por la cual un atacante remoto, sin cuenta en el sistema, puede ejecutar código en una máquina vulnerable, con los privilegios del usuario lp. | |
Solution |
|
Puede utilizar los mecanismos de actualización propios de su distribución, o bien obtener las fuentes del software y compilarlo ud. Mismo. Actualización de software Debian Linux Debian GNU/Linux 2.2 (potato) Todas las arquitecturas: http://security.debian.org/pool/updates/main/h/html2ps/html2ps_1.0b1-8.2_all.deb Fuentes: http://security.debian.org/pool/updates/main/h/html2ps/html2ps_1.0b1-8.2.dsc http://security.debian.org/pool/updates/main/h/html2ps/html2ps_1.0b1-8.2.diff.gz http://security.debian.org/pool/updates/main/h/html2ps/html2ps_1.0b1.orig.tar.gz Debian GNU/Linux 3.0 (woody) Todas las arquitecturas: http://security.debian.org/pool/updates/main/h/html2ps/html2ps_1.0b3-1.2_all.deb Fuentes: http://security.debian.org/pool/updates/main/h/html2ps/html2ps_1.0b3-1.2.dsc http://security.debian.org/pool/updates/main/h/html2ps/html2ps_1.0b3-1.2.diff.gz http://security.debian.org/pool/updates/main/h/html2ps/html2ps_1.0b3.orig.tar.gz SuSE Linux SuSE Linux 7.0 Arquitectura Intel ftp://ftp.suse.com/pub/suse/i386/update/7.0/gra1/html2ps-1.0b1-428.i386.rpm Arquitectura Alpha ftp://ftp.suse.com/pub/suse/axp/update/7.0/gra1/html2ps-1.0b1-328.alpha.rpm Arquitectura PowerPC ftp://ftp.suse.com/pub/suse/ppc/update/7.0/gra1/html2ps-1.0b1-302.ppc.rpm SRPMS ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/html2ps-1.0b1-428.src.rpm ftp://ftp.suse.com/pub/suse/axp/update/7.0/zq1/html2ps-1.0b1-328.src.rpm ftp://ftp.suse.com/pub/suse/ppc/update/7.0/zq1/html2ps-1.0b1-302.src.rpm SuSE Linux 7.1 Arquitectura Intel ftp://ftp.suse.com/pub/suse/i386/update/7.1/gra1/html2ps-1.0b1-431.i386.rpm Arquitectura PowerPC ftp://ftp.suse.com/pub/suse/ppc/update/7.1/gra1/html2ps-1.0b1-303.ppc.rpm SRPMS ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/html2ps-1.0b1-431.src.rpm ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/html2ps-1.0b1-303.src.rpm SuSE Linux 7.2 Arquitectura Intel ftp://ftp.suse.com/pub/suse/i386/update/7.2/gra1/html2ps-1.0b1-432.i386.rpm SRPMS ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/html2ps-1.0b1-432.src.rpm SuSE Linux 7.3 Arquitectura Intel ftp://ftp.suse.com/pub/suse/i386/update/7.3/gra1/html2ps-1.0b3-457.i386.rpm Arquitectura Sparc ftp://ftp.suse.com/pub/suse/sparc/update/7.3/gra1/html2ps-1.0b3-88.sparc.rpm SRPMS ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/html2ps-1.0b3-457.src.rpm ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/html2ps-1.0b3-88.src.rpm SuSE Linux 8.0 Arquitectura Intel ftp://ftp.suse.com/pub/suse/i386/update/8.0/gra1/html2ps-1.0b3-456.i386.rpm SRPMS ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/html2ps-1.0b3-456.src.rpm SuSE Linux 8.1 Arquitectura Intel ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/html2ps-1.0b3-458.i586.rpm SRPMS ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/html2ps-1.0b3-458.src.rpm |
|
Standar resources |
|
Property | Value |
CVE | CAN-2002-1275 |
BID | |
Other resources |
|
Debian Security Advisory DSA-192-1 http://www.debian.org/security/2002/dsa-192 SuSE Security Advisory 2002:040 http://www.suse.de/de/security/2002_040_lprng_html2ps.html Bugtraq ID: 6079 http://www.securityfocus.com/bid/6079 ISS X-Force Advisory: LPRng html2ps print filter could allow remote command execution http://xforce.iss.net/xforce/xfdb/10526 |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2003-11-05 |