Multiple BSD Vendor lpd Buffer...

- AV AC AU C I A
发布: 2001-08-29
修订: 2025-04-13

The BSD print protocol daemon, shipped with many systems, contains a remotely exploitable buffer overflow vulnerability. The daemon listens on TCP port 515 and facilitates printing over a network. It is often enabled by default. The printer daemon must be properly configured to exploit this vulnerability. Some systems do not ship with the service enabled, such as OpenBSD and FreeBSD. On systems where the daemon is enabled, the attack must be launched from a host in the '/etc/hosts.equiv' or '/etc/hosts.lpd' files. If exploited, remote attackers may be able to gain superuser access to vulnerable systems.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息