TUCoPS :: SCO :: bt1634.txt

UnixWare 7.1.3 Open UNIX 8.0.0 UnixWare 7.1.1 : CDE libDtHelp buffer overflow



----- Original Message -----
From: <security@sco.com>
To: <announce@lists.caldera.com>; <bugtraq@securityfocus.com>;
<full-disclosure@lists.n>
Sent: Tuesday, November 04, 2003 9:35 AM
Subject: UnixWare 7.1.3 Open UNIX 8.0.0 UnixWare 7.1.1 : CDE libDtHelp
buffer overflow


>
> To: announce@lists.caldera.com bugtraq@securityfocus.com
full-disclosure@lists.n
> etsys.com
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>
>
____________________________________________________________________________
__
>
> SCO Security Advisory
>
> Subject: UnixWare 7.1.3 Open UNIX 8.0.0 UnixWare 7.1.1 : CDE libDtHelp
buffer overflow
> Advisory number: CSSA-2003-SCO.31
> Issue date: 2003 October 31
> Cross reference: sr885326 fz528372 erg712445 CAN-2003-083 CERT VU#575804
>
____________________________________________________________________________
__
>
>
> 1. Problem Description
>
> The Common Desktop Environment (CDE) is a standard desktop
> environment for UNIX based systems. CDE libDTHelp contains
> a buffer overflow that can be exploited by a local user
> using specially crafted environment variables.
>
> An authenticated local user may be able to execute arbitrary
> code with root privileges. There is a possibility that a
> user can set the crafted environment variable to gain
> elevated privileges during initialization of the dtHelp
> application, or applications which link to libtDtHelp.
>
> The Common Vulnerabilities and Exposures project (cve.mitre.org)
> has assigned the name CAN-2003-0834 to this issue. CERT has
> assigned the name VU#575804 to this issue
>
>
> 2. Vulnerable Supported Versions
>
> System Binaries
> ----------------------------------------------------------------------
> UnixWare 7.1.3 /usr/dt/lib/libDtHelp.so.1
> Open UNIX 8.0.0 /usr/dt/lib/libDtHelp.so.1
> UnixWare 7.1.1 /usr/dt/lib/libDtHelp.so.1
>
>
> 3. Solution
>
> The proper solution is to install the latest packages.
>
>
> 4. UnixWare 7.1.3 / Open UNIX 8.0.0 / UnixWare 7.1.1
>
> 4.1 Location of Fixed Binaries
>
> ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.31
>
>
> 4.2 Verification
>
> MD5 (erg712445.pkg.Z) = ecd4aaba3c6d0f7a22b7d2812fc9a174
>
> md5 is available for download from
> ftp://ftp.sco.com/pub/security/tools
>
>
> 4.3 Installing Fixed Binaries
>
> Upgrade the affected binaries with the following sequence:
>
> Download erg712445.pkg.Z to the /var/spool/pkg directory
>
> # uncompress /var/spool/pkg/erg712445.pkg.Z
> # pkgadd -d /var/spool/pkg/erg712445.pkg
>
>
> 5. References
>
> Specific references for this advisory:
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0834
> http://www.kb.cert.org/vuls/id/575804
>
> SCO security resources:
> http://www.sco.com/support/security/index.html
>
> This security fix closes SCO incidents sr885326 fz528372
> erg712445.
>
>
> 6. Disclaimer
>
> SCO is not responsible for the misuse of any of the information
> we provide on this website and/or through our security
> advisories. Our advisories are a service to our customers
> intended to promote secure installation and use of SCO
> products.
>
>
> 7. Acknowledgments
>
> SCO would like to thank Kevin Kotas from Computer Associates
> Intl. eTrust eVM
>
>
____________________________________________________________________________
__
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.3 (SCO/UNIX_SVR5)
>
> iD8DBQE/pwZJaqoBO7ipriERAjH3AJ4mYxEOeObr+UMsJBYv0SN1GOI8fgCfZYCp
> MdtzcKQfYCslwCLHodM3sdA=
> =N1HZ
> -----END PGP SIGNATURE-----

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH