7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
5.3%
A vulnerability in a program supplied with the SCO OpenServer operating system may allow local attackers to gain elevated privileges.
SCO OpenServer is a UNIX-like operating system for Intel and AMD platforms. The ‘scosession
’ session handling component, which is responsible for starting and stopping X server sessions, contains a flaw in the handling of command-line arguments which may allow a local authenticated attacker to gain elevated privileges. This applies to SCO OpenServer 5.0.6 and 5.0.7.
Local authenticated users may gain elevated privileges on affected platforms.
Apply an update
Updates for SCO OpenServer 5.0.6 and 5.0.7 are available at this time. More information can be found in SCO Security Advisory SCOSA-2005.5.
972598
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: January 25, 2005 Updated: January 28, 2005
Affected
Please see the following link for more information from SCO on this issue:
<<ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.5/SCOSA-2005.5.txt>>
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23972598 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to SCO Security for reporting this vulnerability, who in turn credit Joel Soderberg and Christer Oberg of Deprotect with the discovery.
This document was written by Ken MacInnis.
CVE IDs: | CVE-2003-1021 |
---|---|
Severity Metric: | 7.29 Date Public: |