Subject: UnixWare 7.1.1 Open UNIX 8.0.0 : command line argument buffer overflow in ps
Advisory number: CSSA-2003-SCO.1
Issue date: 2003 January 10
Cross reference:
________________________________________________________________________
______
1. Problem Description
The ps command has a command line argument buffer overflow.
Note that ps is not a setuid or setgid program, but instead it
is authorized to use (and does use) the
procprivl(SETPRV,pm_work(P_MACREAD) call. Therefore, this
vulnerability is exploitable, and could be used to run code of
the attacker's choice with these elevated privileges.
2. Vulnerable Supported Versions
System Binaries
----------------------------------------------------------------------
UnixWare 7.1.1 /sbin/ps
/usr/bin/ps
Open UNIX 8.0.0 /sbin/ps
/usr/bin/ps
3. Solution
The proper solution is to install the latest packages.
This security fix closes SCO incidents sr868388, fz525923,
erg712109.
7. Disclaimer
SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers
intended to promote secure installation and use of SCO
products.
8. Acknowledgements
SCO Security discovered and researched this vulnerability.
________________________________________________________________________
______
SCO Security Advisory
Subject: UnixWare 7.1.1 Open UNIX 8.0.0 : command line argument buffer overflow in ps
Advisory number: CSSA-2003-SCO.1
Issue date: 2003 January 10
Cross reference:
________________________________________________________________________
______
1. Problem Description
The ps command has a command line argument buffer overflow.
Note that ps is not a setuid or setgid program, but instead it
is authorized to use (and does use) the
procprivl(SETPRV,pm_work(P_MACREAD) call. Therefore, this
vulnerability is exploitable, and could be used to run code of
the attacker's choice with these elevated privileges.
2. Vulnerable Supported Versions
System Binaries
----------------------------------------------------------------------
UnixWare 7.1.1 /sbin/ps
/usr/bin/ps
Open UNIX 8.0.0 /sbin/ps
/usr/bin/ps
3. Solution
The proper solution is to install the latest packages.
4. UnixWare 7.1.1
4.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/updates/OpenUNIX/CSSA-2003-SCO.1
4.2 Verification
MD5 (erg712109.pkg.Z) = 70777560bc1e0d55ceff89dfd8334c47
md5 is available for download from
ftp://ftp.sco.com/pub/security/tools
4.3 Installing Fixed Binaries
Upgrade the affected binaries with the following sequence:
Download erg712109.pkg.Z to the /var/spool/pkg directory
# uncompress /var/spool/pkg/erg712109.pkg.Z
# pkgadd -d /var/spool/pkg/erg712109.pkg
5. Open UNIX 8.0.0
5.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/updates/OpenUNIX/CSSA-2003-SCO.1
5.2 Verification
MD5 (erg712109.pkg.Z) = 70777560bc1e0d55ceff89dfd8334c47
md5 is available for download from
ftp://ftp.sco.com/pub/security/tools
5.3 Installing Fixed Binaries
Upgrade the affected binaries with the following sequence:
Download erg712109.pkg.Z to the /var/spool/pkg directory
# uncompress /var/spool/pkg/erg712109.pkg.Z
# pkgadd -d /var/spool/pkg/erg712109.pkg
6. References
Specific references for this advisory:
none
SCO security resources:
http://www.sco.com/support/security/index.html
This security fix closes SCO incidents sr868388, fz525923,
erg712109.
7. Disclaimer
SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers
intended to promote secure installation and use of SCO
products.
8. Acknowledgements
SCO Security discovered and researched this vulnerability.
________________________________________________________________________
______
[ reply ]