COMMAND
apsfilter
SYSTEMS AFFECTED
apsfilter 5.4.1
PROBLEM
Following is based on FreeBSD Security Advisory. apsfilter is a
print filter which automatically handles the conversion of
various types of file into a format understood by the printer.
The apsfilter port, versions 5.4.1 and below, contain a
vulnerability which allow local users to execute arbitrary
commands as the user running lpd, user root in a default FreeBSD
installation. The apsfilter software allows users to specify
their own filter configurations, which are read in an insecure
manner and may be used to elevate privileges.
Local users can cause arbitrary commands to be executed as root.
If you have not chosen to install the apsfilter port/package, then
your system is not vulnerable to this problem.
SOLUTION
Deinstall the apsfilter port/package, if you you have installed
it. For FreeBSD do one of the following:
1) Upgrade your entire ports collection and rebuild the
apsfilter port.
2) Deinstall the old package and install a new package dated
after the correction date, obtained from:
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/print/apsfilter-5.4.2.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/print/apsfilter-5.4.2.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/print/apsfilter-5.4.2.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/print/apsfilter-5.4.2.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/print/apsfilter-5.4.2.tgz
3) download a new port skeleton for the apsfilter port from:
http://www.freebsd.org/ports/
and use it to rebuild the port.