Vulnerabilities > CVE-2001-0800 - Remote Command Execution vulnerability in IRIX 'lpsched'

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
sgi
critical
exploit available
metasploit

Summary

lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters.

Exploit-Db

  • descriptionIrix LPD tagprinter Command Execution. CVE-2001-0800. Remote exploit for irix platform
    idEDB-ID:10033
    last seen2016-02-01
    modified2001-09-01
    published2001-09-01
    reporterH D Moore
    sourcehttps://www.exploit-db.com/download/10033/
    titleIrix LPD tagprinter - Command Execution
  • descriptionIrix LPD tagprinter Command Execution. CVE-2001-0800. Remote exploit for irix platform
    idEDB-ID:16877
    last seen2016-02-02
    modified2010-10-06
    published2010-10-06
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16877/
    titleIrix LPD tagprinter Command Execution

Metasploit

descriptionThis module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix.
idMSF:EXPLOIT/IRIX/LPD/TAGPRINTER_EXEC
last seen2020-01-15
modified2017-07-24
published2006-02-05
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0800
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/irix/lpd/tagprinter_exec.rb
titleIrix LPD tagprinter Command Execution

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/82229/tagprinter_exec.rb.txt
idPACKETSTORM:82229
last seen2016-12-05
published2009-10-27
reporterH D Moore
sourcehttps://packetstormsecurity.com/files/82229/Irix-LPD-tagprinter-Command-Execution.html
titleIrix LPD tagprinter Command Execution