COMMAND

    apsfilter

SYSTEMS AFFECTED

    apsfilter 5.4.1

PROBLEM

    Following is based on FreeBSD  Security Advisory.  apsfilter is  a
    print  filter  which  automatically  handles  the  conversion   of
    various types of file into a format understood by the printer.

    The  apsfilter  port,   versions  5.4.1  and   below,  contain   a
    vulnerability  which  allow  local  users  to  execute   arbitrary
    commands as the user running  lpd, user root in a  default FreeBSD
    installation.   The  apsfilter  software  allows  users to specify
    their own  filter configurations,  which are  read in  an insecure
    manner and may be used to elevate privileges.

    Local users can cause arbitrary  commands to be executed as  root.
    If you have not chosen to install the apsfilter port/package, then
    your system is not vulnerable to this problem.

SOLUTION

    Deinstall the  apsfilter port/package,  if you  you have installed
    it.  For FreeBSD do one of the following:

      1) Upgrade  your  entire  ports  collection  and  rebuild    the
         apsfilter port.
      2) Deinstall  the old  package and  install a  new package dated
         after the correction date, obtained from:
         ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/print/apsfilter-5.4.2.tgz
         ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/print/apsfilter-5.4.2.tgz
         ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/print/apsfilter-5.4.2.tgz
         ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/print/apsfilter-5.4.2.tgz
         ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/print/apsfilter-5.4.2.tgz
      3) download a new port skeleton for the apsfilter port from:
         http://www.freebsd.org/ports/
         and use it to rebuild the port.