Vulnerabilities > CVE-2000-0917

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
caldera
redhat
trustix
critical
nessus
exploit available
metasploit

Summary

Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.

Exploit-Db

  • descriptionLPRng 3.6.22/23/24 Remote Root Exploit. CVE-2000-0917. Remote exploit for linux platform
    idEDB-ID:226
    last seen2016-01-31
    modified2000-12-11
    published2000-12-11
    reportersk8
    sourcehttps://www.exploit-db.com/download/226/
    titleLPRng 3.6.22/23/24 - Remote Root Exploit
  • descriptionLPRng (RedHat 7.0) lpd Remote Root Format String Exploit. CVE-2000-0917. Remote exploit for linux platform
    idEDB-ID:227
    last seen2016-01-31
    modified2000-12-11
    published2000-12-11
    reporterDiGiT
    sourcehttps://www.exploit-db.com/download/227/
    titleLPRng RedHat 7.0 lpd Remote Root Format String Exploit
  • descriptionLPRng 3.6.24-1 Remote Root Exploit. CVE-2000-0917. Remote exploit for linux platform
    idEDB-ID:230
    last seen2016-01-31
    modified2000-12-15
    published2000-12-15
    reporterVeNoMouS
    sourcehttps://www.exploit-db.com/download/230/
    titleLPRng 3.6.24-1 - Remote Root Exploit
  • descriptionLPRng use_syslog Remote Format String Vulnerability. CVE-2000-0917. Remote exploit for linux platform
    idEDB-ID:16842
    last seen2016-02-02
    modified2010-07-03
    published2010-07-03
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16842/
    titleLPRng use_syslog Remote Format String Vulnerability

Metasploit

descriptionThis module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin".
idMSF:EXPLOIT/LINUX/MISC/LPRNG_FORMAT_STRING
last seen2020-05-22
modified2017-07-24
published2010-02-17
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/misc/lprng_format_string.rb
titleLPRng use_syslog Remote Format String Vulnerability

Nessus

NASL familyGain a shell remotely
NASL idLPRNG.NASL
descriptionLPRng seems to be running on this port. Versions of LPRng prior to 3.6.24 are missing format string arguments in at least two calls to
last seen2020-06-01
modified2020-06-02
plugin id10522
published2000-10-01
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10522
titleLPRng use_syslog() Remote Format String Arbitrary Command Execution
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(10522);
 script_version("1.31");
 script_cvs_date("Date: 2018/11/15 20:50:22");

 script_cve_id("CVE-2000-0917");
 script_bugtraq_id(1712);
 script_xref(name:"CERT", value:"382365");

 script_name(english:"LPRng use_syslog() Remote Format String Arbitrary Command Execution");
 script_summary(english:"Checks for a vulnerable version of LPRng");

 script_set_attribute(attribute:"synopsis", value:"The remote print service is affected by format string vulnerabilities.");
 script_set_attribute(attribute:"description", value:
"LPRng seems to be running on this port.

Versions of LPRng prior to 3.6.24 are missing format string arguments
in at least two calls to 'syslog()' that handle user-supplied input.

Using specially crafted input with format strings, an unauthenticated,
remote attacker may be able to leverage these issues to execute
arbitrary code subject to the privileges under which the service
operates, typically 'root'.

Note that Nessus has not determined that the remote installation of
LPRng is vulnerable, only that it is listening on this port.");
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2000/Sep/432");
 script_set_attribute(attribute:"solution", value:"Upgrade, if necessary, to LPRng version 3.6.25.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"metasploit_name", value:'LPRng use_syslog Remote Format String Vulnerability');
 script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"2000/09/25");
 script_set_attribute(attribute:"plugin_publication_date", value:"2000/10/01");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:caldera:openlinux_ebuilder");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english:"Gain a shell remotely");

 script_dependencie("find_service1.nasl");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports(515);

 exit(0);
}


include("audit.inc");
include("global_settings.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

if (get_port_state(515))
{
soc = open_sock_tcp(515);
if(soc)
{
 snd = raw_string(9)+ string("lp") + raw_string(0x0A);

 send(socket:soc, data:snd);
 r = recv(socket:soc, length:1024);
 if("SPOOLCONTROL" >< r)
 {
  security_hole(515);
 }
}
}

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/86422/lprng_format_string.rb.txt
idPACKETSTORM:86422
last seen2016-12-05
published2010-02-17
reporterjduck
sourcehttps://packetstormsecurity.com/files/86422/LPRng-use_syslog-Remote-Format-String-Vulnerability.html
titleLPRng use_syslog Remote Format String Vulnerability

Redhat

advisories
rhsa
idRHSA-2000:065