Skip to main content

CVE-1999-0061: File creation and deletion, and remote execution, in the BSD line printer daemon (lpd).

Medium
VulnerabilityCVE-1999-0061cve-1999-0061
Published: Thu Oct 02 1997 (10/02/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: bsdi
Product: bsd_os

Description

File creation and deletion, and remote execution, in the BSD line printer daemon (lpd).

AI-Powered Analysis

AILast updated: 07/01/2025, 23:12:28 UTC

Technical Analysis

CVE-1999-0061 is a medium-severity vulnerability affecting the BSD line printer daemon (lpd), a service responsible for managing print jobs on BSD operating systems. The vulnerability allows an unauthenticated remote attacker to create and delete files arbitrarily and execute commands remotely via the lpd service. This occurs because the lpd daemon does not properly validate input or restrict file operations, enabling attackers to manipulate the file system and execute code with the privileges of the lpd process. The affected versions include BSD OS versions 2.1, 6.2, and 2.6.20.1, which are legacy systems dating back to the late 1990s. The CVSS score of 5.1 reflects a medium impact, with network attack vector, high attack complexity, no authentication required, and partial impact on confidentiality, integrity, and availability. No patches are available for this vulnerability, and there are no known exploits in the wild, likely due to the age and declining use of these BSD versions. However, the vulnerability remains relevant for legacy systems still in operation, especially in environments where lpd is enabled and exposed to untrusted networks.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the presence of legacy BSD systems running vulnerable versions of the lpd daemon. If such systems are still in use, an attacker could remotely execute arbitrary commands, leading to unauthorized access, data manipulation, or denial of service. This could compromise sensitive data confidentiality and integrity, disrupt printing services critical to business operations, and potentially serve as a foothold for further network intrusion. Given the lack of patches, organizations relying on these legacy systems face increased risk, especially if the lpd service is exposed to external networks without proper segmentation or firewall controls. The impact is heightened in sectors with strict data protection regulations, such as finance, healthcare, and government, where unauthorized access could lead to regulatory penalties and reputational damage.

Mitigation Recommendations

Given the absence of official patches, European organizations should prioritize the following mitigations: 1) Disable the lpd service on all BSD systems unless absolutely necessary. 2) If printing services are required, replace lpd with modern, actively maintained printing systems that have robust security controls. 3) Restrict network access to the lpd service using firewalls or network segmentation to limit exposure to trusted internal networks only. 4) Monitor network traffic for unusual activity targeting port 515 (default lpd port) and implement intrusion detection/prevention systems to detect exploitation attempts. 5) For legacy systems that cannot be upgraded, consider deploying compensating controls such as application-layer proxies or wrappers that validate and sanitize input to the lpd daemon. 6) Conduct regular security audits and vulnerability assessments to identify any remaining vulnerable systems and plan for their decommissioning or upgrade.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7de806

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 11:12:28 PM

Last updated: 8/9/2025, 2:13:54 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats