Bugtraq mailing list archives

Security Update: [CSSA-2001-SCO.3] UnixWare - cron buffer overflow


From: sco-security () caldera com
Date: Wed, 27 Jun 2001 16:06:20 -0700

To: bugtraq () securityfocus com security-announce () lists securityportal com

___________________________________________________________________________

            Caldera International, Inc. Security Advisory

Subject:                UnixWare - cron buffer overflow
Advisory number:        CSSA-2001-SCO.3
Issue date:             2001 June, 27
Cross reference:
___________________________________________________________________________



1. Problem Description

        The cron command is vulnerable to a command line argument
        buffer overflow. This could allow a process to execute
        arbitrary code, allowing a malicious user to gain elevated
        privileges.


2. Vulnerable Versions

        Operating System        Version         Affected Files
        ------------------------------------------------------------------
        UnixWare 7              All             /usr/bin/crontab


3. Workaround

        None.


4. UnixWare 7

  4.1 Location of Fixed Binaries

        ftp://ftp.sco.com/pub/security/unixware/sr847406/


  4.2 Verification

        md5 checksums:
        
        2f00acf514126ad9e8bced6ceb7bb66e        erg711714a.Z


        md5 is available for download from

                ftp://ftp.sco.com/pub/security/tools/


  4.3 Installing Fixed Binaries

        Upgrade the affected binaries with the following commands:

        # uncompress /tmp/erg711714a.Z
        # pkgadd -d /tmp/erg711714a


5. References

        http://www.calderasystems.com/support/security/index.html


6. Disclaimer

        Caldera International, Inc. is not responsible for the misuse
        of any of the information we provide on our website and/or
        through our security advisories. Our advisories are a service
        to our customers intended to promote secure installation and
        use of Caldera International, Inc. products.

___________________________________________________________________________

Attachment: _bin
Description:


Current thread: