{"vuid":"VU#966075","idnumber":"966075","name":"HP-UX vulnerable to buffer overflow in line printer daemon (rlpdaemon) via crafted print request","keywords":["HP-UX","buffer overflow","line printer daemon","rlpdaemon","crafted print request"],"overview":"The line printer daemon (rlpdaemon) on HP-UX systems enable various clients to share printers over a network. There exists a buffer overflow vulnerability in this daemon that permits remote execution of arbitrary commands with elevated privileges.","clean_desc":"A buffer overflow exists in HP-UX's line printer daemon (rlpdaemon) that may allow an intruder to execute arbitrary code with superuser privilege on the target system. The rlpdaemon is installed by default and is active even if it is not being used. An intruder does not need any prior knowledge, or privileges on the target system in order to exploit this vulnerability.","impact":"An intruder can execute arbitrary commands.","resolution":"Hewlett-Packard has released HPSBUX0108-163 to address this issue. Please see the vendor statement for instructions and patches.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered and researched by Chris Spencer of Internet Security Systems (ISS). The CERT/CC wishes to thank ISS for the information contained in their advisory.","author":"This document was written by Jason Rafail.","public":["http://www.securityfocus.com/bid/3240","http://xforce.iss.net/alerts/advise93.php","http://itrc.hp.com","http://www.ciac.org/ciac/bulletins/l-134.shtml"],"cveids":["CVE-2001-0668"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-08-27T17:10:26Z","publicdate":"2001-08-27T00:00:00Z","datefirstpublished":"2001-10-16T19:11:28Z","dateupdated":"2001-11-09T17:10:34Z","revision":9,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"18.75","cam_scorecurrentwidelyknown":"22.5","cam_scorecurrentwidelyknownexploited":"37.5","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":18.75,"vulnote":null}