Users login

Create an account »


Users login

Home » Hacking News » CSSA-2002-SCO.8-dlvr_audit: exploitable buffer overflow

CSSA-2002-SCO.8-dlvr_audit: exploitable buffer overflow

by Nikola Strahija on March 12th, 2002 The dlvr_audit command has an exploitable buffer overflow that can be used by a malicious user to become root.

2. Vulnerable Supported Versions

Operating System Version Affected Files
OpenServer 5.0.5, 5.0.6 /etc/auth/dlvr_audit

This has already been fixed in OpenServer 5.0.6a.

3. Workaround


4. OpenServer

4.1 Location of Fixed Binaries

4.2 Verification

MD5 (oss645a) = ebfbb4d2931fb83e8ccc2390868bb11f

md5 is available for download from

4.3 Installing Fixed Binaries

Upgrade the affected binaries with the following commands:


You MUST first install "SLS OSS640A: BIND Update" before
attempting to install this SLS. SLS OSS640A installs files
that are necessary for OSS645A (this SLS) to function


1. Download the OSS645A media image file
(, place the file
in the /tmp directory and rename the file by typing these

mv /tmp/oss645a /tmp/VOL.000.000

2. Run the Software Manager with the command:

# scoadmin software

or double-click on the Software Manager icon in the

3. Pull down the "Software" menu and select "Install New".

4. When prompted for the host from which to install, choose
the local machine and then "Continue".

5. In the "Select Media" menu, pull down the "Media Device"
menu. Select "Media Images", then choose "Continue".

6. When prompted for the "Image Directory", enter "/tmp" (or
the directory where you placed the VOL file in step 1) and
choose "OK".

7. When prompted to select software to install, make sure that
the "OSS645A: Audit Subsystem Security Supplement" entry is
highlighted. Choose "Install".

8. Installation of SLS OSS645A is now complete. To exit the
Software Manager, select "Exit" from the "Host" menu.

5. References

This and other advisories are located at

This advisory addresses Caldera Security internal incidents
erg377672, SCO-247-295.

6. Disclaimer

Caldera International, Inc. is not responsible for the misuse
of any of the information we provide on our website and/or
through our security advisories. Our advisories are a service
to our customers intended to promote secure installation and
use of Caldera International products.

7. Acknowledgements

This vulnerability was discovered and researched by Tomasz


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »