Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:1821 |
Message | EXPLOIT LPD dvips remote command execution attempt |
Summary | This event is generated when an attempt is made to exploit a known vulnerability in dvips on some RedHat Linux systems. |
Impact | Execution of commands with the privileges of the lp daemon. |
Detailed Information | dvips is used to convert DVI documents into PostScript format for printing. The line printer daemon may use dvips to print DVI documents using a filter. A configuration error in some distributions of RedHat Linux allows a remote attacker to execute commands via this utility. |
Affected Systems | RedHat Linux 6.2, 7.0 and 7.1 |
Attack Scenarios | The attacker can place the commands to be excuted in a DVI file and send that to the lp daemon. |
Ease of Attack | Simple. No exploit software is required. |
Corrective Action | Upgrade to the latest non-affected version of the software. Ensure that dvips is executed in safe mode by the lp daemon by specifying the use of the -R flag in the dvi-to-ps.fpi configuration file. |
Additional References | Bugtraq: http://www.securityfocus.com/bid/3241 CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1002 |
Rule References | bugtraq: 3241 cve: 2001-1002 nessus: 11023 |
--
DID:431442
--
http://www.aanval.com/