The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


OpenLinux: slocate local user buffer overflow


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Wed, 11 Feb 2004 11:21:29 -0800 (PST)
From: [email protected]
To: [email protected], [email protected],
Subject: OpenLinux: slocate local user buffer overflow


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

			SCO Security Advisory

Subject:		OpenLinux: slocate local user buffer overflow
Advisory number: 	CSSA-2004-001.0
Issue date: 		2004 February 10
Cross reference: 	sr886033 fz528414 erg712456
______________________________________________________________________________


1. Problem Description

	Heap-based buffer overflow in main.c of slocate 2.6, and possibly
	other versions, may allow local users to gain privileges via a
	modified slocate database that causes a negative "pathlen" value
	to be used. The Common Vulnerabilities and Exposures project
	(cve.mitre.org) has assigned the name CAN-2003-0848 to this issue.


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------
	OpenLinux 3.1.1 Server		prior to slocate-2.7-1.i386.rpm
	OpenLinux 3.1.1 Workstation	prior to slocate-2.7-1.i386.rpm


3. Solution

	The proper solution is to install the latest packages. Many
	customers find it easier to use the Caldera System Updater, called
	cupdate (or kcupdate under the KDE environment), to update these
	packages rather than downloading and installing them by hand.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-001.0/RPMS

	4.2 Packages

	fd4e0b81e27fd236fcf0e34c28dcca2c	slocate-2.7-1.i386.rpm

	4.3 Installation

	rpm -Fvh slocate-2.7-1.i386.rpm

	4.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-001.0/SRPMS

	4.5 Source Packages

	3a2adce6e30bdcba92fe6a7f70216461	slocate-2.7-1.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-001.0/RPMS

	5.2 Packages

	44f7234c2a58efada5512157bc421d78	slocate-2.7-1.i386.rpm

	5.3 Installation

	rpm -Fvh slocate-2.7-1.i386.rpm

	5.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-001.0/SRPMS

	5.5 Source Packages

	e2f70c80ae832d1267ce22e62ea90d15	slocate-2.7-1.src.rpm


6. References

	Specific references for this advisory:
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0848
		http://marc.theaimsgroup.com/?l=bugtraq&m=106546447321274&w=2
		http://marc.theaimsgroup.com/?l=bugtraq&m=106589631819348&w=2
		http://www.ebitech.sk/patrik/SA/SA-20031006.txt
		http://www.ebitech.sk/patrik/SA/SA-20031006-A.txt

	SCO security resources:
		http://www.sco.com/support/security/index.html

	This security fix closes SCO incidents sr886033 fz528414
	erg712456.


7. Disclaimer

	SCO is not responsible for the misuse of any of the information
	we provide on this website and/or through our security
	advisories. Our advisories are a service to our customers intended
	to promote secure installation and use of SCO products.


8. Acknowledgements

	SCO would like to thank Patrik Hornik

______________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (SCO/UNIX_SVR5)

iD8DBQFAKY0fbluZssSXDTERAu6rAKC+SIPACchxNJ579hYlNnXz9jEOQwCg5w+c
DU21bhDCYBuhyJTHWipdffw=
=vPHf
-----END PGP SIGNATURE-----

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру