On Mon, Jan 15, 2001 at 10:10:08AM +0100, V. Achiaga wrote: > > > Hey, > > What u mean debian-specific patch? > > I only want to mean a patch including the patch.diff file, or an > official debian package (.deb file)
if debian is vulnerable then a updated package should indeed be placed in security.debian.org > > > I know there's a debian package of lprng, but I don't know if the patch > > > you're talking about is applied to this package, I guess you should check > > > the changelog to find out. > > At the moment, the patch isnt applied... So I think that debian is > vulnerable. i am not certain that it is, from the original post to BugTraq telnetting to the printer port and entering several %s would cause the daemon to segfault, this does not occur on debian. also i tried an exploit (targetted at RH7) which had various bruteforce options against debian and it failed. does not necessarily mean its not vulnerable of course... a couple things i noticed: lprng does *NO* logging that i can see, syslog seems to direct lpr logs to /var/log/lpr.log which is empty on my system no matter what i do. also from the lprng changelog.Debian.gz: lprng (3.6.12-7) stable; urgency=high * SECURITY FIXES!! * syslog() overflow bug fixed * getttext NLSPATH security bug fixed. * spool_file_perms security bug fixed. * Added setuid Linux bug work-around. -- Craig Small <[EMAIL PROTECTED]> Sun, 15 Oct 2000 15:42:02 -0500 as i understand it the syslog() problem in this case is a format string so that might be something different. as far as i can tell debian's lprng never logs anything so perhaps never calls syslog(). i wish debian released security unadvisories when thier package is not vulnerable to a certain bug like this... -- Ethan Benson http://www.alaska.net/~erbenson/
pgpAlDI35fBIk.pgp
Description: PGP signature