Date: Tue, 18 Jun 2002 15:37:31 -0700
From: [email protected]
To: [email protected], [email protected],
Subject: Security Update: [CSSA-2002-SCO.27] UnixWare 7.1.1 Open UNIX 8.0.0 : ppptalk root privilege vulnerability
--17pEHd4RhPHOinZp
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
To: [email protected][email protected][email protected]
______________________________________________________________________________
Caldera International, Inc. Security Advisory
Subject: UnixWare 7.1.1 Open UNIX 8.0.0 : ppptalk root privilege vulnerability
Advisory number: CSSA-2002-SCO.27
Issue date: 2002 June 18
Cross reference:
______________________________________________________________________________
1. Problem Description
If pppd is running (which it is on a default installation),
a malicious user can use /usr/bin/ppptalk (or its link,
/usr/bin/ppp), to gain root privileges.
2. Vulnerable Supported Versions
System Binaries
----------------------------------------------------------------------
UnixWare 7.1.1 /usr/bin/ppptalk
Open UNIX 8.0.0 /usr/bin/ppptalk
3. Solution
The proper solution is to install the latest packages.
However, removing the setuid bits from the /etc/ppptalk
binary will effectively eliminate the vulnerability.
4. UnixWare 7.1.1
4.1 Location of Fixed Binaries
ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.27
4.2 Verification
MD5 (erg712071.pkg.Z) = 9e353b58860c1b2ab4e831410f44fa12
md5 is available for download from
ftp://ftp.caldera.com/pub/security/tools
4.3 Installing Fixed Binaries
Upgrade the affected binaries with the following commands:
Download erg712071.pkg.Z to the /var/spool/pkg directory
# uncompress /var/spool/pkg/erg712071.pkg.Z
# pkgadd -d /var/spool/pkg/erg712071.pkg
5. Open UNIX 8.0.0
5.1 Location of Fixed Binaries
ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.27
5.2 Verification
MD5 (erg712071.pkg.Z) = 9e353b58860c1b2ab4e831410f44fa12
md5 is available for download from
ftp://ftp.caldera.com/pub/security/tools
5.3 Installing Fixed Binaries
Upgrade the affected binaries with the following commands:
Download erg712071.pkg.Z to the /var/spool/pkg directory
# uncompress /var/spool/pkg/erg712071.pkg.Z
# pkgadd -d /var/spool/pkg/erg712071.pkg
6. References
Specific references for this advisory:
none
Caldera security resources:
http://www.caldera.com/support/security/index.html
This security fix closes Caldera incidents sr865661, fz521199
and erg712071.
7. Disclaimer
Caldera International, Inc. is not responsible for the
misuse of any of the information we provide on this website
and/or through our security advisories. Our advisories are
a service to our customers intended to promote secure
installation and use of Caldera products.
______________________________________________________________________________
--17pEHd4RhPHOinZp
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAj0PtisACgkQaqoBO7ipriEXPwCgniryryxQAIz+UV5RepVN0RZS
v2IAmwTchX+VW+Yge1K6Cu7T4DQW+zbQ
=Hd09
-----END PGP SIGNATURE-----
--17pEHd4RhPHOinZp--