CERT-In Advisory
CIAD-2004-0015
OpenServer Multiple Vulnerabilities in MMDF package from SCO Caldera
Original Issue Date: July 22, 2004
Severity Rating: High
Systems Affected
- SCO Caldera OpenServer Release - 5.0.6 & 5.0.7 - MMDF package
Overview
SCO Caldera have reported buffer overflow and denial of service vulnerabilities in SCO OpenServer MMDF. MMDF Multi-channel Memo Distribution Facility is a Mail Transfer Agent MTA for UNIX and specifically shipped along with SCO OpenServer.
Description
SCO Caldera OpenServer versions 5.0.6 and 5.0.7 are vulnerable to (i) multiple buffer overflows (ii) a denial of service attack caused by a vulnerability in the MMDF package. A remote attacker could exploit these vulnerabilities to -
1. overflow a buffer and possibly execute arbitrary code on the system or cause the system to crash (Gain Access). This is known to affect "execmail".
(
CAN-2004-0510
)
2. cause a NULL pointer dereference denial of service attack :
(
CAN-2004-0511
)
3. cause a core dump on the system denial of service attack :
(
CAN-2004-0512
)
Solution
Apply appropriate patches/upgrades to the fixed binaries as suggested by the vendor, as mentioned in SCO Security Advisory SCOSA-2004.7, available at -
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.7
The fixes are also available in SCO OpenServer Release 5.0.7 Maintenance Pack 3 or later , available at -
http://www.sco.com/support/update/download/osr507list.html
Vendor Information
These vulnerabilities have been resolved in versions 6.0.4 and 6.5.2. For these vulnerabilities, refer to SCO Security Advisory Number: SCOSA-2004.7, available at -
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.7/SCOSA-2004.7.txt
References
Deprotect Security Advisory 20040206
http://www.deprotect.com/advisories/DEPROTECT-20040206.txt
Zone-h
http://www.zone-h.org/advisories/read/id=5086
Security Focus
http://www.securityfocus.com/archive/1/369404/2004-07-17/2004-07-23/0
ISS X-Force
http://xforce.iss.net/xforce/xfdb/16738
Secunia Advisory: SA12100
http://secunia.com/advisories/12100/
Insecure.org
http://seclists.org/lists/bugtraq/2004/Jul/0251.html
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|