Note: This is an archival copy of Security Sun Alert 200212 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000163.1.
Solaris 9 Operating System
Solaris 10 Operating System
Solaris 8 Operating System
Date of Resolved Release
Security vulnerabilities in lpsched(1M) may allow a local unprivileged user the ability to delete any file or disable the LP print service on a system configured as a print server.
Sun acknowledges, with thanks, Hiroshi Nakano of Ryukoku University for bringing these issues to our attention.
These issues can occur in the following releases:
Note: Solaris 7 will not be evaluated regarding the potential impact of the issue described in this Sun Alert.
This issue only affects systems which have been configured to act as print servers. To determine if the system has been configured as a print server, the following command can be used:
$ ls /etc/lp/printers
If there are files listed, then the host in question is a print server.
There are a number of possible symptoms of this issue, including the modification/deletion of files owned by privileged users and the disabling of the main Solaris print daemon. In order to check whether the Solaris print daemon has been disabled on a print server, the following command can be run:
% lpstat -r
and will return either "scheduler is running" or "scheduler is not running."
There is no workaround to these issues. Please see the Resolution section below.
These issues are addressed in the following releases:
This solution has no attachment