Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » Solaris Print Protocol Daemon Remote Buffer Overflow Vulnerability

Solaris Print Protocol Daemon Remote Buffer Overflow Vulnerability

by platon on June 20th, 2001 The print protocol daemon, 'in.lpd', shipped with Solaris contains a remotely exploitable buffer overflow vulnerability.

The daemon is enabled by default and runs with root privileges.

Remote attackers can exploit this vulnerability to execute arbitrary code on the target host...



Administrators are strongly advised to either apply network access control to the service or disable 'in.lpd'. The daemon can be disabled by commenting out its associated line in '/etc/inetd.conf' and re-starting inetd.

[Homepage]


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »