Lucene search

K
certCERTVU:972598
HistoryFeb 21, 2005 - 12:00 a.m.

SCO OpenServer vulnerable to privilege escalation in 'scosession' argument handling

2005-02-2100:00:00
www.kb.cert.org
29

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.3%

Overview

A vulnerability in a program supplied with the SCO OpenServer operating system may allow local attackers to gain elevated privileges.

Description

SCO OpenServer is a UNIX-like operating system for Intel and AMD platforms. The ‘scosession’ session handling component, which is responsible for starting and stopping X server sessions, contains a flaw in the handling of command-line arguments which may allow a local authenticated attacker to gain elevated privileges. This applies to SCO OpenServer 5.0.6 and 5.0.7.


Impact

Local authenticated users may gain elevated privileges on affected platforms.


Solution

Apply an update

Updates for SCO OpenServer 5.0.6 and 5.0.7 are available at this time. More information can be found in SCO Security Advisory SCOSA-2005.5.


Vendor Information

972598

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

SCO __ Affected

Notified: January 25, 2005 Updated: January 28, 2005

Status

Affected

Vendor Statement

Please see the following link for more information from SCO on this issue:

<<ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.5/SCOSA-2005.5.txt&gt;&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

US-CERT has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23972598 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to SCO Security for reporting this vulnerability, who in turn credit Joel Soderberg and Christer Oberg of Deprotect with the discovery.

This document was written by Ken MacInnis.

Other Information

CVE IDs: CVE-2003-1021
Severity Metric: 7.29 Date Public:

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.3%

Related for VU:972598