Lucene search

K
certCERTVU:575804
HistoryNov 04, 2003 - 12:00 a.m.

CDE libDtHelp vulnerable to buffer overflow via DTHELPUSERSEARCHPATH or DTHELPSEARCHPATH

2003-11-0400:00:00
www.kb.cert.org
14

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.3%

Overview

There is a vulnerability in the Common Desktop Environment (CDE) for UNIX systems which can allow a local user to gain root privileges.

Description

The Common Desktop Environment (CDE) is a standard desktop environment for UNIX based systems. CDE libDtHelp contains a buffer overflow that can be exploited by a local user. By modifying the DTHELPUSERSEARCHPATH or DTHELPSEARCHPATH environment variables and invoking Help an attacker can gain elevated privileges. For example, since dtprintinfo is commonly setuid root, it may be exploited by a local user to gain root privileges. Other programs that run with elevated privileges and link libDtHelp are also potential attack vectors.


Impact

An authenticated local user may be able to execute arbitrary code with root privileges. The attacker may also be able to crash vulnerable programs causing a denial of service.


Solution

Apply Patch or Upgrade

Apply a patch or upgrade as advised by your vendor. See the Systems Affected section for more information.


Vendor Information

575804

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Hewlett-Packard Company __ Affected

Notified: October 09, 2003 Updated: December 03, 2003

Status

Affected

Vendor Statement

============================================== Hewlett-Packard Company

SOURCE: Hewlett-Packard Company Software Security Response Team (SSRT)

Date: November 4, 2003 CROSS REFERENCE ID: SSRT3657

Hewlett Packard is currently investigating the potential impact to HP released operating system software.

HP will provide notice of the availability of any necessary patches through standard security bulletin announcements and be available from your normal HP Services support channel.

To report any security issue for any HP software products send email to [email protected]

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see HPSBUX0311-297 / SSRT3657 for more information.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).

IBM eServer __ Affected

Notified: October 09, 2003 Updated: November 04, 2003

Status

Affected

Vendor Statement

IBM eServer Platform Response

For information related to this and other published CERT Advisories that may relate to the IBM eServer Platforms (xSeries, iSeries, pSeries, and zSeries) please go to https://app-06.www.ibm.com/servers/resourcelink/lib03020.nsf/pages/security=alerts?OpenDocument&pathID=

In order to access this information you will require a Resource Link ID. To subscribe to Resource Link go to <http://app-06.www.ibm.com/servers/resourcelink&gt; and follow the steps for registration.

All questions should be reffered to [email protected].

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).

SCO __ Affected

Notified: October 09, 2003 Updated: November 05, 2003

Status

Affected

Vendor Statement

`Vulnerable Supported Versions


UnixWare 7.1.3
Open UNIX 8.0.0 (a.k.a UnixWare 7.1.2)
UnixWare 7.1.1
`

`Location of Fixed Binaries


&lt;ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.31&gt;
SCO security resources can be found at
<http://www.sco.com/support/security/index.html&gt;``
`

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).

Sun Microsystems Inc. __ Affected

Notified: October 09, 2003 Updated: November 10, 2003

Status

Affected

Vendor Statement

Common Desktop Environment (CDE) distributed with Solaris Operating Environment is vulnerable. For more details please refer to Sun Alert 57414 available at: ``&lt;http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57414&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).

Xi Graphics __ Affected

Notified: October 09, 2003 Updated: November 04, 2003

Status

Affected

Vendor Statement

Xi Graphics deXtop CDE 3.0 is vulnerable. An update will be made available on our ftp site on Monday Nov 3. The location of the update will be:

<ftp://ftp.xig.com/pub/updates/dextop/3.0/DEX3000.003.tar.gz&gt;
<ftp://ftp.xig.com/pub/updates/dextop/3.0/DEX3000.003.txt&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).

IBM __ Not Affected

Notified: October 09, 2003 Updated: November 04, 2003

Status

Not Affected

Vendor Statement

The AIX Operating System is not vulnerable to the issues discussed in CERT Vulnerability Note VU#575804.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).

Cray Inc. Unknown

Notified: October 09, 2003 Updated: October 16, 2003

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).

Data General Unknown

Notified: October 09, 2003 Updated: October 16, 2003

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).

Open Group Unknown

Notified: October 09, 2003 Updated: October 16, 2003

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).

SGI Unknown

Notified: October 09, 2003 Updated: October 16, 2003

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Kevin Kotas of Computer Associates eTrust Vulnerability Manager. Thanks also to XiGraphics and SCO for information used in this document.

This document was written by Robert C. Seacord and Art Manion.

Other Information

CVE IDs: CVE-2003-0834
Severity Metric: 2.81 Date Public:

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.3%