ESCPUtil 1.15.2 2 - Printer Name Local Buffer Overflow

Author: Karol Wiesek
type: local
platform: linux
port: 
date_added: 2003-01-21  
date_updated: 2012-10-28  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 22190.txt  
source: https://www.securityfocus.com/bid/6658/info

It has been reported that a buffer overflow in escputil exists. When supplied with excessively long arguments, it is possible to overwrite stack memory.

escputil is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if the utility is installed or runs with elevated privileges.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21001.tar.gz