Vulnerability Description
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sgi | Irix | 5.0 |
| Bsdi | Bsd Os | 2.1 |
| Freebsd | Freebsd | 2.0 |
| Next | Nextstep | 4.0 |
| Sun | Sunos | 4.1.3u1 |
References
- ftp://patches.sgi.com/support/free/security/advisories/19980402-01-PX
- http://www.ciac.org/ciac/bulletins/i-042.shtml
- http://www.securityfocus.com/bid/707
- ftp://patches.sgi.com/support/free/security/advisories/19980402-01-PX
- http://www.ciac.org/ciac/bulletins/i-042.shtml
- http://www.securityfocus.com/bid/707
FAQ
What is CVE-1999-0032?
CVE-1999-0032 is a vulnerability with a CVSS score of 7.2 (HIGH). Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
How severe is CVE-1999-0032?
CVE-1999-0032 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-1999-0032?
Check the references section above for vendor advisories and patch information. Affected products include: Sgi Irix, Bsdi Bsd Os, Freebsd Freebsd, Next Nextstep, Sun Sunos.