-----BEGIN PGP SIGNED MESSAGE----- $Id: lpr-vulnerability-0.6-linux,v 1.2 1996/11/25 22:39:20 alex Exp $ Linux Security FAQ Update lpr Vulnerability Mon Nov 25 16:56:59 EST 1996 Copyright (C) 1995,1996 Alexander O. Yuriev (alex@bach.cis.temple.edu) CIS Laboratories TEMPLE UNIVERSITY U.S.A. ============================================================================ This is an official Update of the Linux Security FAQ, and it is supposed to be signed by one of the following PGP keys: 1024/ADF3EE95 1995/06/08 Linux Security FAQ Primary Key <Alexander O. Yuriev> Unless you are able to verify at least one of signatures, please be very careful when following instructions. Linux Security WWW: bach.cis.temple.edu/linux/linux-security linux-security & linux-alert mailing list archives: ftp://linux.nrao.edu/pub/linux/security/list-archive ============================================================================ REVISION HISTORY (This section in automatically maintained by the Revision Control System ) $Log: lpr-vulnerability-0.6-linux,v $ Revision 1.2 1996/11/25 22:39:20 alex GNU/Debian Linux 1.1 -- Information about the vulnerability corrected A section on lpr version numbering added LPRng release site is used as a distribution site for the LPRng Revision 1.1 1996/11/22 21:42:46 alex Initial revision ABSTRACT A vulnerability exists in the lpr program of Berkeley-derived lpr print-spool program. If installed suid to root, the lpr program allows local users to gain access to a super-user account. This is version 1.2 of the LSF Updated titled "lpr vulnerability" This LSF Update superceeds and obsoletes the LSF Update version 1.1 titled "lpr vulnerability" dated Thu Nov 21 22:24:12 EST 1996. This LSF Update corrects information for Debian/GNU Linux distribution. Due to miscommunication with Debain Project version 1.1 of LSF Update "lpr vulnerability" contained incorrect information regarding vulnerability of Debian/GNU Linux distribution 1.1. This LSF Update also provides explanation of a confusion caused by different version numbering schemes adopted by different distributions. There are no other significant changes in version 1.2 of the LSF Update "lpr vulnerability" compared to version 1.1 of this LSF Update. ABOUT LPR VERSION NUMBERING SCHEMES Unfortunately, different distributions use different version numbering schemes for the same utilities. At this moment, a lpr utility exists in at least the following packages: Berkeley-derived lpr 5.9 lpr.c identifies itself between 1.1 and 1.4 This lpr is vulnerable. Berkeley-derived lpr 5.9, a part of a NetKit 0.6B (separate package) Utilities/System%package lpr name: NetKit-B version: 0.06 Description: Printing support (lpr, lpd, etc) Depending on the release, this version of lpr can be vulnerable. Berkeley-derived lpr 5.9, based on a part of NetKit 0.6B Depending on the release, can be vulnerable. Release lpr-0.12-1 from RedHat is not vulnerable to the lpr bug. LPRng 2.3.12 lpr Part of LPRng print subsystem. lpr.c identifies itself as v3.3 Non-vulnerable to lpr bug. This LSF Update applies to Berkeley-derived lpr 5.9. RISK ASSESSMENT Local users can gain root privileges. The exploits that exercise this vulnerability were made available. VULNERABILITY ANALYSIS lpr utility from Berkeley-derived lpr subsystem, which originally was used in NetKit 0.6B suffers from the buffer overrun problem. Installing lpr as a suid-to-root is needed to allow print spooling. DISTRIBUTION FIXES Red Hat Commercial Linux RedHat 2.1, RedHat 3.0.3 (Picasso) and RedHat 4.0 contain vulnerable lpr utility. Users of RedHat Linux distributions prior to version 4.0 are urged to upgrade to RedHat Linux 4.0 The replacement RPMS are available from the following URLs: RedHat 4.0 x86 Architecture ftp://ftp.redhat.com/pub/redhat/redhat-4.0/updates/i386/lpr-0.12-1.i386.rpm ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/lpr-0.12-1.i386.rpm RedHat 4.0 Alpha Architecture ftp://ftp.redhat.com/pub/redhat/redhat-4.0/updates/axp/lpr-0.12-1.axp.rpm ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/lpr-0.12-1.axp.rpm RedHat 4.0 SPARC Architecture ftp://ftp.redhat.com/pub/redhat/redhat-4.0/updates/sparc/lpr-0.12-1.sparc.rpm ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/lpr-0.12-1.sparc.rpm Please verify the MD5 fingerprint of the RPMs prior to installing them. 6d36461d6c8b6c50ccadf9de530a6136 lpr-0.12-1.i386.rpm 87eb9c5b4d7e6a4217fdb9d3bbd6527b lpr-0.12-1.axp.rpm c04359e61cd16108ce5793aa388f206f lpr-0.12-1.sparc.rpm Caldera Network Desktop Caldera Network Desktop version 1.0 contains a vulnerable lpr program. The replacement RPMS are available from the following URLs: ftp://ftp.caldera.com/pub/cnd-1.0/updates/NetKit-B-lpr-0.06-4c2.i386.rpm ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/CND/NetKit-B-lpr-0.06-4c2.i386.rpm WARNING: We are unable to provide the MD5 fingerprint for the replacement kit from Caldea as it was not provided to us. Debian/GNU Linux Debian/GNU Linux 1.1 contains a vulnerable Berkeley-derived lpr utility which is installed as a part of a standard installation. If LPRng package is installed, the Debian/GNU Linux 1.1 contains a non-vulnerable lpr utility. The corrected Debain/GNU Linux 1.1 Berkeley-derived lpr package is available from the following URLs: Debian 1.1 i386 Architecture: ftp://ftp.debian.org/debian/rex/binary-i386/net/lpr_5.9-13.deb ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/Debian/lpr_5.9-13.deb Debian-development (no official release) m68k Architecture Debian-development (no official release) sparc Architecture Debian-development (no official release) alpha Architecture There are no binary packages of Berkeley-derived lpr subsystem for these architectures available at this moment. The source package files for lpr are available from the following URLs: ftp://ftp.debian.org/debian/rex/source/net/lpr_5.9-13.tar.gz ftp://ftp.debian.org/debian/rex/source/net/lpr_5.9-13.diff.gz ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/Debian/lpr_5.9-13.tar.gz ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/Debian/lpr_5.9-13.diff.gz Please verify the MD5 fingerprint of the Debian packages prior to installing them. 4288f4a14b58f439bd0930d2d4631301 lpr_5.9-13.deb ac2f7f38fb410267742c3612ff9d2565 lpr_5.9-13.diff.gz e02b657d2dee61e0efa48b8fb0246b1e lpr_5.9-13.tar.gz In addition to a Berkeley-derived lpr an alternative printing subsystem called LPRng is available for Debian. LPRng is an enhanced printer spooler system, with functionality similar to the Berkeley lpr software. Besides having more features LPRng avoids typical security holes by not running as root. The vulnerability described above doesn''t apply to LPRng. The Debian packages of LPRng are available from the following URLs: Debian 1.1 i386 Architecture ftp://ftp.debian.org/debian/bo/binary-i386/net/lprng_2.4.2-1.deb ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/Debian/lprng_2.4.2-1.deb Debian-development (no official release) m68k Architecture Debian-development (no official release) sparc Architecture Debian-development (no official release) alpha Architecture There are no binary packages of LPRng for these architectures available yet. You have to compile them from the sources. The source package files for LPRng are available from the following URLs: ftp://ftp.debian.org/debian/bo/source/net/lprng_2.4.2-1.dsc ftp://ftp.debian.org/debian/bo/source/net/lprng_2.4.2.orig.tar.gz ftp://ftp.debian.org/debian/bo/source/net/lprng_2.4.2-1.diff.gz ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/Debian/lprng_2.4.2-1.dsc ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/Debian/lprng_2.4.2.orig.tar.gz ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/Debian/lprng_2.4.2-1.diff.gz Please verify the MD5 fingerprint of the Debian packages prior to installing them. b791d997d66b67bc1393ffd8281030bc lprng_2.4.2-1.diff.gz c0b60491659d7e074afa58c6329117ad lprng_2.4.2-1.dsc 14b21cd6947e03c517fa50f5ddbb7ef7 lprng_2.4.2.orig.tar.gz Slackware There is no official information available about vulnerability of Slackware 3.0 or Slackware 3.1 distributions from distribution maintainer. The testing indicates that both Slackware 3.0 and Slackware 3.1 distributions contains vulnerable lpr program. Until the official fix-kit for Slackware 3.0 and Slackware 3.1 available system administrators are advised to follow the instructions in the Other Linux Distributions section of this LSF Update. Yggdrasil Yggdrasil Computing Inc neither confirmed not denied vulnerability of Plug and Play Fall''95 Linux. The testing indicates that Plug and Play Fall''95 Linux distribution contains a vulnerable lpr. Until the official fix-kit for Yggdrasil Plug and Play Linux becomes available, system administrators are advised to follow the instructions in the Other Linux Distributions section of this LSF Update Other Linux Distributions It is believed at this moment that all Linux distributions using Berkeley-derived lpr subsystem based on the NetKit 0.06 or prior contain a vulnerable lpr program. Administrators of systems based on distributions not listed in this update or distributions that do not have fix-kits available at the moment are urged to contact their support centers requesting the fix-kits to be made available to them. In order to prevent the vulnerability from being exploited in the mean time, it is recommended that the suid bit is removed from the lpr program using command chmod u-s /usr/bin/lpr Until the official fix-kits are available for those systems, it is advised that system administrators obtain the source code of a LPRng print system used in Debian/GNU Linux 1.1, compile it and replace the Berkeley lpr subsystem. The LPRng software can be obtained from the following URLs: ftp://dickory.sdsu.edu/pub/LPRng/LPRng-2.4.2.tgz ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/OTHER/LPRng-2.4.2.tgz Please verify the MD5 fingerprint of the files prior to installing them. 7e96acf72e504189db0dc5ea6982f6f0 LPRng-2.4.2.tgz CREDITS This LSF Update is based on the information originally posted to linux-security mailing list. The information on the fix-kit for Red Hat commercial Linux was provided by Marc Ewing (marc@redhat.com) of Red Hat Software Inc,; for the Caldera Network Desktop by Ron Holt of Caldera Inc.; for Debian/GNU Linux 1.1 by Sven Rudolph <sr1@inf.tu-dresden.de> of Debian Project. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMpog7IxFUz2t8+6VAQFPnAP/SD0K9sfu6jFc6QlH2odDRyaRrDXNWApT 3hoi7Yjjovgd9XNIEhT52l6brZhghrYTv3UHDv6toJxsB3+fCN22SSpxDljdu4v9 EOdS186FK5FigFP3ehU/XFyPta5jNABG9cwNnXmFMuZOPEUwULujS18xEG68hUnn fHKgPLsPpVU=RbMG -----END PGP SIGNATURE-----