I'm still behind on my email so I don't know if this went out already today or not. Carl P. ----- Forwarded message from CERT Advisory ----- CERT Advisory CA-2001-30 Multiple Vulnerabilities in lpd Original release date: November 05, 2001 Last revised: -- Source: CERT/CC A complete revision history can be found at the end of this file. Systems Affected * BSDi BSD/OS Version 4.1 and earlier * Debian GNU/Linux 2.1 and 2.1r4 * FreeBSD All released versions FreeBSD 4.x, 3.x, FreeBSD 4.3-STABLE, 3.5.1-STABLE prior to the correction date * Hewlett-Packard HP9000 Series 700/800 running HP-UX releases 10.01, 10.10, 10.20, 11.00, and 11.11 * IBM AIX Versions 4.3 and AIX 5.1 * Mandrake Linux Versions 6.0, 6.1, 7.0, 7.1 * NetBSD 1.5.2 and earlier * OpenBSD Version 2.9 and earlier * Red Hat Linux 6.0 all architectures * SCO OpenServer Version 5.0.6a and earlier * SGI IRIX 6.5-6.5.13 * Sun Solaris 8 and earlier * SuSE Linux Versions 6.1, 6.2, 6.3, 6.4, 7.0, 7.1, 7.2 Overview There are multiple vulnerabilities in several implementations of the line printer daemon (lpd). The line printer daemon enables various clients to share printers over a network. Review your configuration to be sure you have applied all relevant patches. We also encourage you to restrict access to the lpd service to only authorized users. II. Impact All of these vulnerabilities can be exploited remotely. In most cases, they allow an intruder to execute arbitrary code with the privileges of the lpd server. In some cases, an intruder must have access to a machine listed in /etc/hosts.equiv or /etc/hosts.lpd, and in some cases, an intruder must be able to control a nameserver. III. Solution Apply a patch from your vendor ______________________________________________________________________ This document is available from: http://www.cert.org/advisories/CA-2001-30.html ______________________________________________________________________