|
|
CVE-ID | ||
---|---|---|
CVE-2002-1285 |
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
|
|
Description | ||
runlpr in the LPRng package allows the local lp user to gain root privileges via certain command line arguments. | ||
References | ||
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete. | ||
|
||
Assigning CNA | ||
MITRE Corporation | ||
Date Record Created | ||
20021112 | Disclaimer: The record creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE. | |
Phase (Legacy) | ||
Proposed (20030317) | ||
Votes (Legacy) | ||
ACCEPT(3) Armstrong, Cole, Green MODIFY(1) Cox |
||
Comments (Legacy) | ||
CHANGE> [Cox changed vote from REVIEWING to MODIFY] Cox> LPRng does not contain anything called runlpr, and in fact if you look at the packages SuSE say that they ship as part of the erratum they don't even provide updated LPRng packages. However they do ship lprfilter packages and looking inside them I find that they are what contain this runlpr program: http://at.rpmfind.net/opsys/linux/RPM/suse.com/i386/update/8.0/ap1/lpdfilter-0.42-155.i386.html This states that lpdfilter is a collection of scripts written by SuSE, and the changelog even highlights this is where the security fix was made. Therefore I believe that the CVE reference and all the descriptions of this vulnerability, which are based on a bad advisory description from SuSE, are also wrong, it should be: "runlpr from the SuSE lpdfilter package allows the local lp user to gain root privileges via certain command line arguments." |
||
Proposed (Legacy) | ||
20030317 | ||
This is an record on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. | ||
You can also search by reference using the CVE Reference Maps.
|
||
For More Information: CVE Request Web Form (select "Other" from dropdown) |