CVE-ID

CVE-2002-1285

• Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings
Description
runlpr in the LPRng package allows the local lp user to gain root privileges via certain command line arguments.
References
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
Date Entry Created
20021112 Disclaimer: The entry creation date may reflect when the CVE-ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Phase (Legacy)
Proposed (20030317)
Votes (Legacy)
ACCEPT(3) Armstrong, Cole, Green
MODIFY(1) Cox
Comments (Legacy)
 CHANGE> [Cox changed vote from REVIEWING to MODIFY]
 Cox> LPRng does not contain anything called runlpr, and in fact if you
   look at the packages SuSE say that they ship as part of the erratum they
   don't even provide updated LPRng packages.  However they do ship lprfilter
   packages and looking inside them I find that they are what contain this 
   runlpr program:
   
   http://at.rpmfind.net/opsys/linux/RPM/suse.com/i386/update/8.0/ap1/lpdfilter-0.42-155.i386.html
   
   This states that lpdfilter is a collection of scripts written by SuSE, and
   the changelog even highlights this is where the security fix was made.
   Therefore I believe that the CVE reference and all the descriptions of
   this vulnerability, which are based on a bad advisory description from
   SuSE, are also wrong, it should be:
   
   "runlpr from the SuSE lpdfilter package allows the local lp user to gain
   root privileges via certain command line arguments."

Proposed (Legacy)
20030317
This is an entry on the CVE list, which standardizes names for security problems.