Vulnerability Name:

CVE-1999-0032 (CCN-409)

Assigned:1996-08-01
Published:1996-08-01
Updated:2008-09-09
Summary:Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Caldera International, Inc. Security Advisory SA-1996.05
Vulnerability in lpr

Source: CCN
Type: SGI Security Advisory 19980402-01-PX
lp(1) Security Vulnerabilities

Source: SGI
Type: UNKNOWN
19980402-01-PX

Source: CCN
Type: BugTraq Mailing List, Fri, 25 Oct 1996 16:35:57 +0300
Linux & BSD's lpr exploit

Source: CCN
Type: CIAC Information Bulletin I-042
SGI IRIX lp(1) Security Vulnerability

Source: MITRE
Type: CNA
CVE-1999-0032

Source: MITRE
Type: CNA
CVE-1999-0335

Source: CCN
Type: SuSE Support Database
The printer daemon in packet lprold has a security hole

Source: CCN
Type: CERT Advisory CA-1997-19
lpr Buffer Overrun Vulnerability

Source: CIAC
Type: UNKNOWN
I-042

Source: BID
Type: UNKNOWN
707

Source: CCN
Type: BID-707
Multiple Vendor lpr Buffer Overrun Vulnerability

Source: XF
Type: UNKNOWN
bsd-lprbo(409)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:sgi:irix:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.4:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*
  • OR cpe:/o:next:nextstep:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:next:nextstep:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1.4:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:windriver:bsdos:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-1999-0032 (CCN-446)

    Assigned:1996-10-25
    Published:1997-06-01
    Updated:1997-06-01
    Summary:Ipr is vulnerable to a buffer overflow. An attacker can overflow a buffer to gain root privileges on the system.
    CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
    Exploitability Metrics:Attack Vector (AV): Local
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): High
    Integrity (I): High
    Availibility (A): High
    CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Exploitability Metrics:Access Vector (AV): Local
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Complete
    Integrity (I): Complete
    Availibility (A): Complete
    7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Exploitability Metrics:Access Vector (AV): Local
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): Complete
    Integrity (I): Complete
    Availibility (A): Complete
    Vulnerability Consequences:Gain Privileges
    References:Source: CCN
    Type: Caldera International, Inc. Security Advisory SA-1996.05
    Vulnerability in lpr

    Source: CCN
    Type: FreeBSD Security Advisory FreeBSD-SA-96:18
    Buffer overflow in lpr (revised)

    Source: CCN
    Type: SGI Security Advisory 19980402-01-PX
    lp(1) Security Vulnerabilities

    Source: CCN
    Type: BugTraq Mailing List, Fri, 25 Oct 1996 16:35:57 +0300
    Linux & BSD's lpr exploit

    Source: CCN
    Type: CIAC Information Bulletin I-042
    SGI IRIX lp(1) Security Vulnerability

    Source: MITRE
    Type: CNA
    CVE-1999-0032

    Source: CCN
    Type: AusCERT Advisory AA-96.12
    lpr Buffer Overrun Vulnerability

    Source: CCN
    Type: CERT Advisory CA-1997-19
    lpr Buffer Overrun Vulnerability

    Source: CCN
    Type: BID-707
    Multiple Vendor lpr Buffer Overrun Vulnerability

    Source: XF
    Type: UNKNOWN
    bsd-lprbo2(446)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:windriver:bsdos:*:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.4:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sgi irix 5.0
    sgi irix 5.0.1
    sgi irix 5.1
    sgi irix 5.1.1
    sgi irix 5.2
    sgi irix 5.3
    sgi irix 6.0
    sgi irix 6.0.1
    sgi irix 6.1
    sgi irix 6.2
    sgi irix 6.3
    sgi irix 6.4
    bsdi bsd os 2.1
    freebsd freebsd 2.0
    freebsd freebsd 2.0.5
    freebsd freebsd 2.1.0
    freebsd freebsd 2.1.5
    next nextstep 4.0
    next nextstep 4.1
    sun sunos 4.1.3u1
    sun sunos 4.1.4
    windriver bsdos *
    linux linux kernel *
    freebsd freebsd 2.1.5
    freebsd freebsd 2.0.5
    freebsd freebsd 2.0
    windriver bsdos *
    freebsd freebsd 2.1.0
    sgi irix 5.2
    sgi irix 5.3
    sgi irix 6.0.1
    sgi irix 6.1
    sgi irix 6.2
    sgi irix 6.3
    sgi irix 6.4
    sgi irix 6.0
    sgi irix 5.0.1
    sgi irix 5.1
    sgi irix 5.1.1
    sgi irix 5.0