|Check Point Reference:||CPAI-2005-281|
|Date Published:||25 Oct 2009|
|Last Updated:||10 Sep 2017|
|Protection Provided by:||
|Who is Vulnerable?|
|Vulnerability Description||The Sun Solaris operating system provides a default print service. This service is based on the Line Printer Daemon (LPD) protocol, and is provided through the super daemon inetd. Thus the LPD service is invoked on demand, upon the establishment of new sessions. This type of configuration reduces the load on the system by invoking the print server as it is needed as opposed to having it run continuously. There exists a file deletion vulnerability in the Sun Solaris printd daemon. The vulnerability is caused due to a flaw in the processing of received job requests. A remote attacker can exploit the vulnerability to delete arbitrary files on the target system. The file delete operations are performed with the privileges of the in.lpd daemon, which typically runs as root. Successful attacks can delete arbitrary files and directories on the target host. By removing specific files and directories corrupt or destroy data stored the target file system, or cause a system-wide denial-of-service condition.|
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: Sun Solaris printd Daemon Arbitrary File Deletion