The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


SRT Security Advisory (SRT2002-06-04-1711): SCO crontab


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 4 Jun 2002 17:32:08 -0400 (EDT)
From: zillion <[email protected]>
To: [email protected]
Subject: SRT Security Advisory (SRT2002-06-04-1711): SCO crontab
Cc: [email protected]



Strategic Reconnaissance Team Security Advisory (SRT2002-06-04-1611) Topic : SCO OpenServer crontab format string vulnerability Date : June 04, 2002 Credit : KF dotslash[at]snosoft.com Site : http://www.snosoft.com
.: Description: --------------- The SCO OpenServer crontab application is installed setgid cron and can be used to schedule execution of programs and scripts. This implementation of crontab contains a format string vulnerability which can be used to execute code in order to elevate privileges: $ crontab %x%x%x%x crontab: cannot open file 8047f08804a5578047cd48047cd4 Due to the nature of crontab it is very likely that ones 'cron' group privileges have been obtained it is possible to get higher privileges .: Impact: ---------- Local users can elevate their privileges trough this vulnerability. .: Systems Affected: -------------------- SCO/Caldera OpenServer 5.0.6 .: Solution: ------------ The vendor was notified and is diligently working on a fix. Until such a fix has been made available disable crontab or deny access from untrusted sources to the affected systems.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру