Mail from ILUG-BOM list (Non-Digest Mode)
_______________________________________________

____________________________________________________________________________
___
 Sun Microsystems, Inc. Security Bulletin

 Bulletin Number: #00195
 Date: August 2, 2000
 Cross-Ref:
 Title: lp

____________________________________________________________________________
____

 The information contained in this Security Bulletin is provided "AS IS."
 Sun makes no warranties of any kind whatsoever with respect to the
information
 contained in this Security Bulletin. ALL EXPRESS OR IMPLIED CONDITIONS,
 REPRESENTATIONS AND WARRANTIES, INCLUDING ANY WARRANTY OF NON-INFRINGEMENT
OR
 IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE,
ARE
 HEREBY DISCLAIMED AND EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW.

 IN NO EVENT WILL SUN MICROSYSTEMS, INC. BE LIABLE FOR ANY LOST REVENUE,
 PROFIT OR DATA, OR FOR DIRECT, SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL
 OR PUNITIVE DAMAGES HOWEVER CAUSED AND REGARDLESS OF ANY THEORY OF
LIABILITY
 ARISING OUT OF THE USE OF OR INABILITY TO USE THE INFORMATION CONTAINED IN
 THIS SECURITY BULLETIN, EVEN IF SUN MICROSYSTEMS, INC. HAS BEEN ADVISED OF
 THE POSSIBILITY OF SUCH DAMAGES.

 If any of the above provisions are held to be in violation of applicable
law,
 void, or unenforceable in any jurisdiction, then such provisions are waived
 to the extent necessary for this disclaimer to be otherwise enforceable in
 such jurisdiction.

____________________________________________________________________________
____

 1. Bulletins Topics

 Sun announces the release of patches for Solaris(tm) 8, 7, and 2.6
 (SunOS(tm) 5.8, 5.7, and 5.6) which relate to buffer overflow
 vulnerabilities in libprint.so.2 and patches for Solaris(tm) 7
 and 2.6 which relate to a buffer overflow vulnerability in
 /usr/lib/lp/bin/netpr.

 Sun recommends that you install the patches listed in section 4
 immediately on systems running SunOS 5.8, 5.7, and 5.6.

 2. Who is Affected

 libprint.so.2:

 Vulnerable: SunOS 5.7, 5.7_x86, 5.6, and 5.6_x86
 Not vulnerable: All other supported versions of SunOS.

 /usr/lib/lp/bin/netpr:

 Vulnerable: SunOS 5.8, 5.8_x86 5.7, 5.7_x86, 5.6,
 and 5.6_x86
 Not vulnerable: All other supported versions of SunOS.

 3. Understanding the Vulnerability

 The lpset utility sets printing configuration information in the
 system configuration databases. A buffer overflow vulnerability
 has been discovered in libprint.so.2 which may be exploited by a
 local attacker through lpset to gain root access. A buffer overflow
 vulnerability was also discovered in /usr/lib/lp/bin/netpr which
 may be exploited by a local attacker to gain root access.

 4. List of Patches

 The following patches are available in relation to the above problems.

 OS Version Patch ID
 __________ _________
 SunOS 5.8 109320-01
 SunOS 5.8_x86 109321-01
 SunOS 5.7 107115-05
 SunOS 5.7_x86 107115-05
 SunOS 5.6 106235-06
 SunOS 5.6_x86 106236-06

____________________________________________________________________________
___
 APPENDICES

 A. Patches listed in this bulletin are available to all Sun customers at:

 http://sunsolve.sun.com/securitypatch

 B. Checksums for the patches listed in this bulletin are available at:

 ftp://sunsolve.sun.com/pub/patches/CHECKSUMS

 C. Sun security bulletins are available at:

 http://sunsolve.sun.com/security

 D. Sun Security Coordination Team's PGP key is available at:

 http://sunsolve.sun.com/pgpkey.txt

 E. To report or inquire about a security problem with Sun software, contact
 one or more of the following:

 - Your local Sun answer centers
 - Your representative computer security response team, such as CERT
 - Sun Security Coordination Team. Send email to:

 [EMAIL PROTECTED]

 F. To receive information or subscribe to our CWS (Customer Warning System)
 mailing list, send email to:

 [EMAIL PROTECTED]

 with a subject line (not body) containing one of the following commands:

 Command Information Returned/Action Taken
 _______ _________________________________

 help An explanation of how to get information

 key Sun Security Coordination Team's PGP key

 list A list of current security topics

 query [topic] The email is treated as an inquiry and is forwarded to
 the Security Coordination Team

 report [topic] The email is treated as a security report and is
 forwarded to the Security Coordination Team. Please
 encrypt sensitive mail using Sun Security Coordination
 Team's PGP key

 send topic A short status summary or bulletin. For example, to
 retrieve a Security Bulletin #00138, supply the
 following in the subject line (not body):

 send #138

 subscribe Sender is added to our mailing list. To subscribe,
 supply the following in the subject line (not body):

 subscribe cws your-email-address

 Note that your-email-address should be substituted
 by your email address.

 unsubscribe Sender is removed from the CWS mailing list.

____________________________________________________________________________
____

 Copyright 2000 Sun Microsystems, Inc. All rights reserved. Sun,
 Sun Microsystems, Solaris and SunOS are trademarks or registered trademarks
 of Sun Microsystems, Inc. in the United States and other countries. This
 Security Bulletin may be reproduced and distributed, provided that this
 Security Bulletin is not modified in any way and is attributed to
 Sun Microsystems, Inc. and provided that such reproduction and distribution
 is performed for non-commercial purposes.




_______________________________________________
Website: http://www.ilug-bom.org.in/ilug
Linuxers mailing list
[EMAIL PROTECTED]
http://ilug-bom.org.in/mailman/listinfo/linuxers

Reply via email to