{ "id": "CVE-2003-0144", "sourceIdentifier": "cve@mitre.org", "published": "2003-03-31T05:00:00.000", "lastModified": "2025-04-03T01:03:51.193", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the lprm command in the lprold lpr package on SuSE 7.1 through 7.3, OpenBSD 3.2 and earlier, and possibly other operating systems, allows local users to gain root privileges via long command line arguments such as (1) request ID or (2) user name." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:lprold:lprold:3.0.48:*:*:*:*:*:*:*", "matchCriteriaId": "FADD49BC-8501-4C7F-98F2-04969400A23D" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:bsd:lpr:0.48:*:*:*:*:*:*:*", "matchCriteriaId": "81F6F1BE-8D00-413B-A20B-B0B2A5913549" }, { "vulnerable": true, "criteria": "cpe:2.3:o:bsd:lpr:2000-05-07:*:*:*:*:*:*:*", "matchCriteriaId": "56BE0182-8438-48DD-B651-B598939CF5E1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "183667CA-6DF1-4BFB-AE32-9ABF55B7283A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "EBDDEC3F-52EB-4E1E-84C4-B472600059EC" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B58E02AE-38B4-466E-BF73-2F0B80AF7BA5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "3928D5CF-6FC0-434C-8A80-ABDBF346C2C9" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "314BA420-4C74-4060-8ACE-D7A7C041CF2B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "2EAD7613-A5B3-4621-B981-290C7C6B8BA0" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "36DF0D51-FCFA-46A3-B834-E80DFA91DFDC" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5CB726CF-ADA2-4CDA-9786-1E84AC53740A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1FC373FC-88AC-4B6D-A289-51881ACD57F7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1D2DA7F0-E3C0-447A-A2B0-ECC928389D84" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "FEBE290B-5EC6-4BBA-B645-294C150E417A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "ACE7FDFB-C6A6-4B58-B0B4-236E4EA76EF6" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "0DF053A1-C252-427E-9EEF-27240F422976" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "48A9C344-45AA-47B9-B35A-1A62E220D9C6" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "80EB24F0-46A7-481B-83ED-8BB012AE0C8E" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "AA6AEAF0-FA61-4A3F-A083-1218C2027781" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "60DA30A1-3360-46BC-85B7-008D535F95BE" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "DA33E7E2-DE7B-411E-8991-718DA0988C51" }, { "vulnerable": true, "criteria": "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "1957B3C0-7F25-469B-BC3F-7B09260837ED" } ] } ] } ], "references": [ { "url": "ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/010_lprm.patch", "source": "cve@mitre.org" }, { "url": "ftp://patches.sgi.com/support/free/security/advisories/20030406-02-P", "source": "cve@mitre.org" }, { "url": "http://marc.info/?l=bugtraq&m=104690434504429&w=2", "source": "cve@mitre.org" }, { "url": "http://marc.info/?l=bugtraq&m=104714441925019&w=2", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/8293", "source": "cve@mitre.org" }, { "url": "http://www.debian.org/security/2003/dsa-267", "source": "cve@mitre.org" }, { "url": "http://www.debian.org/security/2003/dsa-275", "source": "cve@mitre.org" }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:059", "source": "cve@mitre.org" }, { "url": "http://www.novell.com/linux/security/advisories/2003_014_lprold.html", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/7025", "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11473", "source": "cve@mitre.org" }, { "url": "ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/010_lprm.patch", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "ftp://patches.sgi.com/support/free/security/advisories/20030406-02-P", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://marc.info/?l=bugtraq&m=104690434504429&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://marc.info/?l=bugtraq&m=104714441925019&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://secunia.com/advisories/8293", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.debian.org/security/2003/dsa-267", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.debian.org/security/2003/dsa-275", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:059", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.novell.com/linux/security/advisories/2003_014_lprold.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/7025", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11473", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }