ID CVE-2003-0144
Summary Buffer overflow in the lprm command in the lprold lpr package on SuSE 7.1 through 7.3, OpenBSD 3.2 and earlier, and possibly other operating systems, allows local users to gain root privileges via long command line arguments such as (1) request ID or (2) user name.
References
Vulnerable Configurations
  • cpe:2.3:a:lprold:lprold:3.0.48:*:*:*:*:*:*:*
    cpe:2.3:a:lprold:lprold:3.0.48:*:*:*:*:*:*:*
  • cpe:2.3:o:bsd:lpr:0.48:*:*:*:*:*:*:*
    cpe:2.3:o:bsd:lpr:0.48:*:*:*:*:*:*:*
  • cpe:2.3:o:bsd:lpr:2000-05-07:*:*:*:*:*:*:*
    cpe:2.3:o:bsd:lpr:2000-05-07:*:*:*:*:*:*:*
  • cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*
    cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*
    cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*
  • cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 11-07-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 7025
bugtraq
  • 20030305 potential buffer overflow in lprm (fwd)
  • 20030308 OpenBSD lprm(1) exploit
confirm ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/010_lprm.patch
debian
  • DSA-267
  • DSA-275
mandrake MDKSA-2003:059
secunia 8293
sgi 20030406-02-P
suse SuSE-SA:2003:0014
xf lprm-bo(11473)
Last major update 11-07-2017 - 01:29
Published 31-03-2003 - 05:00
Last modified 11-07-2017 - 01:29
Back to Top