📄 4144.txt
字号:
Rule:--Sid:4144--Summary:This event is generated when an attempt is made to exploit a knownvulnerability in Solaris Line Printer Daemon (LPD).--Impact:Serious. Unauthorized removal of files on the remote system.--Detailed Information:A vulnerability exists in the Solaris operating system that may allow anunprivileged use to remove any file on a system using the line printerdaemon. This can be done via the Unlink command which can be used tounlink any file on a local or remote sytem accepting connections to lpd.Solaris offers a printer daemon in.lpd that allows network users toprint jobs over the network. The receive printer job function allows auser to supply job control information for the print job. A flaw existsin code that checks the job control information for a supplied file nameto be deleted. It does not make sure that the supplied file name islocated in the default printer queue directory, permitting arbitraryfiles to be deleted.The 'U' command instructs the LPD to unlink a file on completion of aprinting job. By supplying this command in an instruction to the LPD,an attacker is able to remove any file on the remote system.--Affected Systems: Solaris 7,8,9 and 10--Attack Scenarios:An attacker merely needs to supply the 'unlink' command with a path tothe file to be removed in an LPD request to the listening LPD daemon.For example, the command "U/opt/filename" will remove the file"filename" from /opt.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Vulnerability Research TeamJudy Novak <judy.novak@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional ReferencesSunsolve:http://sunsolve.sun.com/search/document.do?assetkey=1-26-101842-1--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -