Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » [CSSA-2003-SCO.1] UnixWare 7.1.1 Open UNIX 8.0.0 : command line argument buffer

[CSSA-2003-SCO.1] UnixWare 7.1.1 Open UNIX 8.0.0 : command line argument buffer

by Nikola Strahija on January 12th, 2003 The ps command has a command line argument buffer overflow. Note that ps is not a setuid or setgid program, but instead it is authorized to use (and does use) the procprivl(SETPRV,pm_work(P_MACREAD) call. Therefore, this vulnerability is exploitable, and could be used to run code of the attacker's choice with these elevated privileges.


Subject: UnixWare 7.1.1 Open UNIX 8.0.0 : command line argument buffer overflow in ps
Advisory number: CSSA-2003-SCO.1
Issue date: 2003 January 10
Cross reference:
______________________________________________________________________________


1. Problem Description

The ps command has a command line argument buffer overflow.
Note that ps is not a setuid or setgid program, but instead it
is authorized to use (and does use) the
procprivl(SETPRV,pm_work(P_MACREAD) call. Therefore, this
vulnerability is exploitable, and could be used to run code of
the attacker's choice with these elevated privileges.


2. Vulnerable Supported Versions

System Binaries
----------------------------------------------------------------------
UnixWare 7.1.1 /sbin/ps
/usr/bin/ps

Open UNIX 8.0.0 /sbin/ps
/usr/bin/ps


3. Solution

The proper solution is to install the latest packages.


4. UnixWare 7.1.1

4.1 Location of Fixed Binaries

ftp://ftp.sco.com/pub/updates/OpenUNIX/CSSA-2003-SCO.1


4.2 Verification

MD5 (erg712109.pkg.Z) = 70777560bc1e0d55ceff89dfd8334c47

md5 is available for download from
ftp://ftp.sco.com/pub/security/tools


4.3 Installing Fixed Binaries

Upgrade the affected binaries with the following sequence:

Download erg712109.pkg.Z to the /var/spool/pkg directory

# uncompress /var/spool/pkg/erg712109.pkg.Z
# pkgadd -d /var/spool/pkg/erg712109.pkg


5. Open UNIX 8.0.0

5.1 Location of Fixed Binaries

ftp://ftp.sco.com/pub/updates/OpenUNIX/CSSA-2003-SCO.1


5.2 Verification

MD5 (erg712109.pkg.Z) = 70777560bc1e0d55ceff89dfd8334c47

md5 is available for download from
ftp://ftp.sco.com/pub/security/tools


5.3 Installing Fixed Binaries

Upgrade the affected binaries with the following sequence:

Download erg712109.pkg.Z to the /var/spool/pkg directory

# uncompress /var/spool/pkg/erg712109.pkg.Z
# pkgadd -d /var/spool/pkg/erg712109.pkg


6. References

Specific references for this advisory:

none

SCO security resources:

http://www.sco.com/support/security/index.html

This security fix closes SCO incidents sr868388, fz525923,
erg712109.


7. Disclaimer

SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers
intended to promote secure installation and use of SCO
products.


8. Acknowledgements

SCO Security discovered and researched this vulnerability.


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »