7.2
CVSSv2

CVE-1999-0032

Published: 25/10/1996 Updated: 09/09/2008
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 730
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.

Vulnerable Product Search on Vulmon Subscribe to Product

sgi irix 5.0

sgi irix 5.3

sgi irix 6.0

sgi irix 6.0.1

sgi irix 6.1

sgi irix 5.1

sgi irix 5.2

sgi irix 6.2

sgi irix 6.4

sgi irix 5.0.1

sgi irix 5.1.1

sgi irix 6.3

freebsd freebsd 2.0

freebsd freebsd 2.0.5

freebsd freebsd 2.1.0

freebsd freebsd 2.1.5

bsdi bsd os 2.1

next nextstep 4.0

sun sunos 4.1.3u1

next nextstep 4.1

sun sunos 4.1.4

Exploits

/* source: wwwsecurityfocuscom/bid/707/info BSD/OS 21,FreeBSD 215,NeXTstep 40/41,SGI IRIX 64,SunOS 413/414 lpr Buffer Overrun Vulnerability (1) Due to insufficient bounds checking on arguments (in this case -C) which are supplied by users, it is possible to overwrite the internal stack space of the lpr program while it is exec ...
/* source: wwwsecurityfocuscom/bid/707/info Due to insufficient bounds checking on arguments (in this case -C) which are supplied by users, it is possible to overwrite the internal stack space of the lpr program while it is executing This can allow an intruder to cause lpr to execute arbitrary commands by supplying a carefully designed ...