Vulnerabilities > CVE-2000-0917
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
OS | 3 | |
OS | 1 | |
OS | 2 |
Exploit-Db
description LPRng 3.6.22/23/24 Remote Root Exploit. CVE-2000-0917. Remote exploit for linux platform id EDB-ID:226 last seen 2016-01-31 modified 2000-12-11 published 2000-12-11 reporter sk8 source https://www.exploit-db.com/download/226/ title LPRng 3.6.22/23/24 - Remote Root Exploit description LPRng (RedHat 7.0) lpd Remote Root Format String Exploit. CVE-2000-0917. Remote exploit for linux platform id EDB-ID:227 last seen 2016-01-31 modified 2000-12-11 published 2000-12-11 reporter DiGiT source https://www.exploit-db.com/download/227/ title LPRng RedHat 7.0 lpd Remote Root Format String Exploit description LPRng 3.6.24-1 Remote Root Exploit. CVE-2000-0917. Remote exploit for linux platform id EDB-ID:230 last seen 2016-01-31 modified 2000-12-15 published 2000-12-15 reporter VeNoMouS source https://www.exploit-db.com/download/230/ title LPRng 3.6.24-1 - Remote Root Exploit description LPRng use_syslog Remote Format String Vulnerability. CVE-2000-0917. Remote exploit for linux platform id EDB-ID:16842 last seen 2016-02-02 modified 2010-07-03 published 2010-07-03 reporter metasploit source https://www.exploit-db.com/download/16842/ title LPRng use_syslog Remote Format String Vulnerability
Metasploit
description | This module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin". |
id | MSF:EXPLOIT/LINUX/MISC/LPRNG_FORMAT_STRING |
last seen | 2020-05-22 |
modified | 2017-07-24 |
published | 2010-02-17 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/misc/lprng_format_string.rb |
title | LPRng use_syslog Remote Format String Vulnerability |
Nessus
NASL family | Gain a shell remotely |
NASL id | LPRNG.NASL |
description | LPRng seems to be running on this port. Versions of LPRng prior to 3.6.24 are missing format string arguments in at least two calls to |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10522 |
published | 2000-10-01 |
reporter | This script is Copyright (C) 2000-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10522 |
title | LPRng use_syslog() Remote Format String Arbitrary Command Execution |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/86422/lprng_format_string.rb.txt |
id | PACKETSTORM:86422 |
last seen | 2016-12-05 |
published | 2010-02-17 |
reporter | jduck |
source | https://packetstormsecurity.com/files/86422/LPRng-use_syslog-Remote-Format-String-Vulnerability.html |
title | LPRng use_syslog Remote Format String Vulnerability |
Redhat
advisories |
|
References
- ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:56.lprng.asc
- http://archives.neohapsis.com/archives/bugtraq/2000-09/0293.html
- http://www.calderasystems.com/support/security/advisories/CSSA-2000-033.0.txt
- http://www.cert.org/advisories/CA-2000-22.html
- http://www.redhat.com/support/errata/RHSA-2000-065.html
- http://www.securityfocus.com/bid/1712
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5287