SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Dtprintinfo Vendors:   Caldera/SCO
(Caldera Issues Fix for UnixWare/Open UNIX) CDE 'dtprintinfo' Buffer Overflow in Search Feature Lets Local Users Gain Root Privileges
SecurityTracker Alert ID:  1004631
SecurityTracker URL:  http://securitytracker.com/id/1004631
CVE Reference:   CVE-2001-0551   (Links to External Site)
Date:  Jun 26 2002
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in the Common Desktop Environment (CDE) 'dtprintinfo' utility. A local user may be able to gain root access on the system.

A local user can reportedly insert a specially crafted string into the 'Entries with' field and select a single Help Volume for an Index search to trigger the buffer overflow. Arbitrary code can be executed with root privileges, giving the local user root level access on the system.

This vulnerability was reported by Kevin Kotas of eSecurityOnline in one of their advisories, available at:

http://www.eSecurityOnline.com/advisories/eSO2406.asp

Impact:   A local user can execute arbitrary code with root privileges to gain root access on the system.
Solution:   Caldera has issued a fix for UnixWare and Open UNIX.

For UnixWare 7.1.1:

Location of Fixed Binaries

ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.30


Verification

MD5 (erg712032.pkg.Z) = b654e5f739056ba4a73e07646e88f049

md5 is available for download from
ftp://ftp.caldera.com/pub/security/tools


Installing Fixed Binaries

Upgrade the affected binaries with the following commands:

Download erg712032.pkg.Z to the /var/spool/pkg directory

# uncompress /var/spool/pkg/erg712032.pkg.Z
# pkgadd -d /var/spool/pkg/erg712032.pkg


For Open UNIX 8.0.0:

Location of Fixed Binaries

ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.30


Verification

MD5 (erg712032.pkg.Z) = b654e5f739056ba4a73e07646e88f049

md5 is available for download from
ftp://ftp.caldera.com/pub/security/tools


Installing Fixed Binaries

Upgrade the affected binaries with the following commands:

Download erg712032.pkg.Z to the /var/spool/pkg directory

# uncompress /var/spool/pkg/erg712032.pkg.Z
# pkgadd -d /var/spool/pkg/erg712032.pkg

Vendor URL:  www.caldera.com/support/security/index.html (Links to External Site)
Cause:   Boundary error
Underlying OS:  UNIX (Open UNIX-SCO)
Underlying OS Comments:  UnixWare 7.1.1, Open UNIX 8.0.0

Message History:   None.


 Source Message Contents

Subject:  Security Update: [CSSA-2002-SCO.30] UnixWare 7.1.1 Open UNIX 8.0.0 : dtprintinfo buffer overflow with Help search


--qDbXVdCdHGoSgWSk
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

To: bugtraq@securityfocus.com announce@lists.caldera.com scoannmod@xenitec.on.ca

______________________________________________________________________________

		Caldera International, Inc.  Security Advisory

Subject:		UnixWare 7.1.1 Open UNIX 8.0.0 : dtprintinfo buffer overflow with Help search
Advisory number: 	CSSA-2002-SCO.30
Issue date: 		2002 June 25
Cross reference:
______________________________________________________________________________


1. Problem Description

	The CDE dtprintinfo program is vulnerable to a buffer
	overflow condition that allows a local attacker to gain
	root access. The problem occurs due to insufficient bounds
	checking in the Volume search field from the Help section.
	An attacker can insert a specially crafted string for the
	search parameter and gain root privileges.


2. Vulnerable Supported Versions

	System				Binaries
	----------------------------------------------------------------------
	UnixWare 7.1.1			/usr/dt/lib/libDtHelp.so.1
	Open UNIX 8.0.0			/usr/dt/lib/libDtHelp.so.1


3. Solution

	The proper solution is to install the latest packages.


4. UnixWare 7.1.1

	4.1 Location of Fixed Binaries

	ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.30


	4.2 Verification

	MD5 (erg712032.pkg.Z) = b654e5f739056ba4a73e07646e88f049

	md5 is available for download from
		ftp://ftp.caldera.com/pub/security/tools


	4.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following commands:

	Download erg712032.pkg.Z to the /var/spool/pkg directory

	# uncompress /var/spool/pkg/erg712032.pkg.Z
	# pkgadd -d /var/spool/pkg/erg712032.pkg


5. Open UNIX 8.0.0

	5.1 Location of Fixed Binaries

	ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.30


	5.2 Verification

	MD5 (erg712032.pkg.Z) = b654e5f739056ba4a73e07646e88f049

	md5 is available for download from
		ftp://ftp.caldera.com/pub/security/tools


	5.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following commands:

	Download erg712032.pkg.Z to the /var/spool/pkg directory

	# uncompress /var/spool/pkg/erg712032.pkg.Z
	# pkgadd -d /var/spool/pkg/erg712032.pkg


6. References

	Specific references for this advisory:
		http://www.eSecurityOnline.com/advisories/eSO2406.asp
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0551

	Caldera security resources:
		http://www.caldera.com/support/security/index.html

	This security fix closes Caldera incidents sr863696, fz520821,
	erg712032.


7. Disclaimer

	Caldera International, Inc. is not responsible for the
	misuse of any of the information we provide on this website
	and/or through our security advisories. Our advisories are
	a service to our customers intended to promote secure
	installation and use of Caldera products.


8. Acknowledgements

	Kevin Kotas of eSecurityOnline discovered this vulnerability.

______________________________________________________________________________

--qDbXVdCdHGoSgWSk
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAj0ZDAAACgkQaqoBO7ipriGJ8ACdHbLa0qXMx7DWkvMFa8uuVK4K
b/cAn3G6tX+s0Ns1scT5fwrssStSZLiU
=hDXU
-----END PGP SIGNATURE-----

--qDbXVdCdHGoSgWSk--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC