Vulnerability Name:

CVE-2001-1583 (CCN-7087)

Assigned:2001-08-31
Published:2001-08-31
Updated:2022-09-13
Summary:lpd daemon (in.lpd) in Solaris 8 and earlier allows remote attackers to execute arbitrary commands via a job request with a crafted control file that is not properly handled when lpd invokes a mail program.
Note: this might be the same vulnerability as CVE-2000-1220.
CVSS v3 Severity:5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
9.0 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
5.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:F/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-78
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Fri Aug 31 2001 - 17:08:09 CDT
Solaris LPD Exploit (fwd)

Source: MITRE
Type: CNA
CVE-2001-1583

Source: BUGTRAQ
Type: Mailing List, Third Party Advisory
20010831 Solaris LPD Exploit (fwd)

Source: MISC
Type: Broken Link
http://metasploit.com/projects/Framework/modules/exploits/solaris_lpd_exec.pm

Source: SF-INCIDENTS
Type: Broken Link
20010829 solaris lpd, KARMAPOLICE?

Source: OSVDB
Type: Broken Link
15131

Source: CCN
Type: OSVDB ID: 15131
Solaris in.lpd Crafted Job Request Arbitrary Remote Command Execution

Source: BID
Type: Exploit, Third Party Advisory, VDB Entry
3274

Source: CCN
Type: BID-3274
Solaris lpd Remote Command Execution Vulnerability

Source: XF
Type: Third Party Advisory, VDB Entry
solaris-lpd-sendmail-commands(7087)

Source: XF
Type: UNKNOWN
solaris-lpd-sendmail-commands(7087)

Source: CCN
Type: Rapid7 Vulnerability and Exploit Database
Solaris LPD Command Execution

Vulnerable Configuration:Configuration 1:
  • cpe:/o:sun:sunos:*:*:*:*:*:*:*:* (Version <= 5.9)

  • Configuration CCN 1:
  • cpe:/o:sun:sunos:5.3:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:2.5::x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:2.5.1::x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:2.6::x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:7.0::x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:2.4::x86:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.2:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:8::x86:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.4:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.5:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:8.0:beta:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sun sunos *
    sun solaris 2.3
    sun solaris 2.5.1
    sun solaris 2.6
    sun solaris 2.5
    sun solaris 2.5.1
    sun solaris 2.6
    sun solaris 7.0
    sun solaris 2.4
    sun solaris 2.2
    sun solaris 8
    sun solaris 7.0
    sun solaris 2.4
    sun solaris 2.0
    sun solaris 2.1
    sun solaris 2.5
    sun solaris 8.0 beta