Debian Security Advisory

lpr -- access control problem and root exploit

Date Reported:
09 Jan 2000
Affected Packages:
lpr
Vulnerable:
Yes
Security database references:
No other external database security references currently available.
More information:
The version of lpr that was distributed with Debian GNU/Linux 2.1 and the updated version released in 2.1r4 have a two security problems:
  • the client hostname wasn't verified properly, so if someone is able to control the DNS entry for their IP they could fool lpr into granting access.
  • it was possible to specify extra options to sendmail which could be used to specify another configuration file. This can be used to gain root access.
Both problems have been fixed in 0.48-0.slink1. We recommend you upgrade your lpr package immediately.
Fixed in:
Source:
http://security.debian.org/dists/stable/updates/source/lpr_0.48-0.slink1.diff.gz
http://security.debian.org/dists/stable/updates/source/lpr_0.48-0.slink1.dsc
http://security.debian.org/dists/stable/updates/source/lpr_0.48.orig.tar.gz
alpha:
http://security.debian.org/dists/stable/updates/binary-alpha/lpr_0.48-0.slink1_alpha.deb
i386:
http://security.debian.org/dists/stable/updates/binary-i386/lpr_0.48-0.slink1_i386.deb
m68k:
http://security.debian.org/dists/stable/updates/binary-m68k/lpr_0.48-0.slink1_m68k.deb
sparc:
http://security.debian.org/dists/stable/updates/binary-sparc/lpr_0.48-0.slink1_sparc.deb