Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Lp Utilities Vendors:   Caldera/SCO
Caldera Open Unix (SCO) lp Utilities May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1002426
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Sep 19 2001
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Caldera reported a security vulnerability in the following line printer utilties for UnixWare and Open Unix: accept, reject, enable, and disable. A buffer overflow may allow a local user to gain elevated privileges on the system.

On UnixWare 7, the following binaries are affected:


On Open Unix, the following binaries are affected:


This vulnerability is related to a recently reported vulnerability in Caldera SCO lpsystem.

Caldera credits KF (dotslash @ with reporting this flaw.

Impact:   A local user can gain elevated privileges.
Solution:   Caldera has released fixed binaries, available at:

md5 checksums:

303d3ffd1acbcf91e50fd6b68ec1a5cf erg711788b.Z

Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Caldera/SCO)

Message History:   None.

 Source Message Contents

Subject:  Security Update: [CSSA-2001-SCO.16] Open Unix, UnixWare 7: lp utility commands: buffer overflows

Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: 8bit            



	    Caldera International, Inc. Security Advisory

Subject:		Open Unix, UnixWare 7: lp utility commands: buffer overflows
Advisory number: 	CSSA-2001-SCO.16
Issue date: 		2001 September 18
Cross reference:

1. Problem Description
	Very long arguments to the line printer utilities accept,
	reject, enable and disable caused a segmentation violation.
	This could be used by an unauthorized user to gain privilege.

2. Vulnerable Versions

	Operating System	Version		Affected Files
	UnixWare 7		All		/usr/bin/enable

	Open Unix		All		/usr/bin/enable

3. Workaround


4. UnixWare 7

  4.1 Location of Fixed Binaries

  4.2 Verification

	md5 checksums:
	303d3ffd1acbcf91e50fd6b68ec1a5cf	erg711788b.Z

	md5 is available for download from

  4.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following commands:

	# uncompress /tmp/erg711788b.Z
	# pkgadd -d /tmp/erg711788b

5. Open Unix

  5.1 Location of Fixed Binaries

  5.2 Verification

	md5 checksums:
	ca3605f82792a855caafe72245425dc9	erg711788a.Z

	md5 is available for download from

  5.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following commands:

	# uncompress /tmp/erg711788a.Z
	# pkgadd -d /tmp/erg711788a

6. References

	This and other advisories are located at

	This advisory addresses Caldera Security internal incidents
	sr849818, sr847404, and sr847403.

7. Disclaimer

	Caldera International, Inc. is not responsible for the misuse
	of any of the information we provide on our website and/or
	through our security advisories. Our advisories are a service
	to our customers intended to promote secure installation and
	use of Caldera International products.

8. Acknowledgements

	Caldera International wishes to thank KF <>
        for discovering and reporting this problem.


Content-Type: application/pgp-signature
Content-Disposition: inline

Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see




Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC