Lucene search

K
certCERTVU:916443
HistoryNov 15, 2001 - 12:00 a.m.

HP Tru64 UNIX "msgchk" contains buffer overflow (SSRT2275)

2001-11-1500:00:00
www.kb.cert.org
11

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

0.4%

Overview

msgchk, a part of the MH mail system, reportedly suffers from a buffer overflow with respect to the name of the inbox to be checked for new mail. This overflow would allow the user of msgchk to execute arbitrary code.

Description

msgchk is the portion of the MH mail system that checks for new mail in the system spool folder. Its optional argument specifies the name of the inbox to be checked. Reportedly, the Tru64 Unix implementation in that an argument of 9000 characters or more will cause a buffer overflow, leading to execution of arbitrary code at the effective user id of the msgchk process.


Impact

If msgchk runs without setuid root privileges, there is no vulnerability here. If msgchk runs with setuid privileges, the user may be able to gain elevated privileges.


Solution

The CERT/CC is currently unaware of a practical solution to this problem.


Remove setuid privileges from msgchk.


Vendor Information

916443

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Hewlett-Packard Company __ Affected

Notified: October 09, 2001 Updated: September 10, 2002

Status

Affected

Vendor Statement

http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23916443 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

<http://www.securityfocus.com/bid/3311&gt;

Acknowledgements

This vulnerability was first reported by Seung Hyun Seo.

This document was written by Tim Shimeall and Ian A. Finlay.

Other Information

CVE IDs: CVE-2001-1093
Severity Metric: 3.00 Date Public:

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

0.4%

Related for VU:916443