CERT-In Vulnerability Note
CIVN-2005-0108
SCO UnixWare ppp Buffer Overflow Vulnerability
Original Issue Date:October 28, 2005
Severity Rating: MEDIUM
Systems Affected
SCO UnixWare 7.1.x
Overview
A buffer overflow vulnerability has been identified in the binary utility 'ppp' of SCO UnixWare, which could allow local users to obtain root privileges.
Description
SCO UnixWare is a UNIX operating system. The vulnerability is due to a stack based buffer overflow in ppp binary that does not properly validate length of arguments for commands prompt or defprompt.
If the length of these arguments exceeds 256 bytes in length, a stack-based buffer overflow occurs. This could be exploited by local users to cause arbitrary code execution with root privileges as ppp is setuid root by default.
Workaround
Remove the setuid bit from the ppp binary sp# chmod u-s /usr/bin/ppp
Solution
Update to the latest version
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.41
Vendor Information
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.41/SCOSA-2005.41.txt
References
Secunia
http://secunia.com/advisories/17275/
SecurityTracker
http://securitytracker.com/alerts/2005/Oct/1015098.html
iDefense
http://www.idefense.com/application/poi/display?id=326&type= vulnerabilities
CVE Name
CAN-2005-2927
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|