The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Security Update: [CSSA-2001-SCO.25] OpenServer: various scoadmin/sysadm subprograms have buffer overflows


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Thu, 11 Oct 2001 13:55:50 -0700
From: [email protected]
To: [email protected], [email protected],
Subject: Security Update: [CSSA-2001-SCO.25] OpenServer: various scoadmin/sysadm subprograms have buffer overflows

--zaRBsRFn0XYhEU69
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

To: [email protected] [email protected] an=
[email protected] [email protected]=20


Do not reply to this mail. This security advisory is being sent from a
nonexistent address in order to avoid spam problems.  Caldera's
contact address for UNIX security issues is [email protected].


___________________________________________________________________________

	    Caldera International, Inc. Security Advisory

Subject:		OpenServer: various scoadmin/sysadm subprograms have buffer overf=
lows
Advisory number: 	CSSA-2001-SCO.25
Issue date: 		2001 October 11
Cross reference:
___________________________________________________________________________


1. Problem Description
=09
	Various programs that scoadmin and sysadmsh use have buffer
	overflows that could be used by a malicious user to gain
	privilege.


2. Vulnerable Versions

	Operating System	Version		Affected Files
	------------------------------------------------------------------
	OpenServer		<=3D 5.0.6a	/usr/lib/sysadm/atcronsh
						/usr/lib/sysadm/auditsh
						/usr/lib/sysadm/authsh
						/usr/lib/sysadm/backupsh
						/usr/lib/sysadm/lpsh
						/usr/lib/sysadm/sysadm.menu
						/usr/lib/sysadm/termsh


3. Workaround

	None.


4. OpenServer

  4.1 Location of Fixed Binaries

	ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.25/


  4.2 Verification

	md5 checksums:
=09
	baf6e1a57f8a86803362a5cf798883aa	sysadm.tar.Z


	md5 is available for download from

		ftp://stage.caldera.com/pub/security/tools/


  4.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following commands:

	( Note: if the sysadmsh subsystem is not installed, it is
	normal for some of the following mv commands to fail.)

	# uncompress /tmp/sysadm.tar.Z
	# for i in atcronsh auditsh authsh backupsh lpsh sysadm.menu termsh
	> do
	> mv /usr/lib/sysadm/$i /usr/lib/sysadm/${i}-
	> chmod 0 /usr/lib/sysadm/${i}-
	> done
	# cd /
	# tar xvf /tmp/sysadm.tar


5. References

	This and other advisories are located at
		http://stage.caldera.com/support/security

	This advisory addresses Caldera Security internal incidents
	sr849820, SCO-559-1295 and erg711790.

6. Disclaimer

	Caldera International, Inc. is not responsible for the misuse
	of any of the information we provide on our website and/or
	through our security advisories. Our advisories are a service
	to our customers intended to promote secure installation and
	use of Caldera International products.


7. Acknowledgements

	Caldera International wishes to thank KF <[email protected]>
        for discovering and reporting this problem.

	=20
___________________________________________________________________________

--zaRBsRFn0XYhEU69
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjvGB1YACgkQaqoBO7ipriGj8gCeKGa7hnEnI9FU6BMH6vMvuBdE
3WUAoKZcPxsFgPhzc8wYDn7gTVJsaq2x
=CV4c
-----END PGP SIGNATURE-----

--zaRBsRFn0XYhEU69--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру