Caldera OpenServer 5.0.5/5.0.6 SCOAdmin Symbolic Link Vulnerability
2002-05-29T00:00:00
ID EDB-ID:21489 Type exploitdb Reporter Kevin Finisterre Modified 2002-05-29T00:00:00
Description
Caldera OpenServer 5.0.5/5.0.6 SCOAdmin Symbolic Link Vulnerability. CVE-2002-0887. Local exploit for sco platform
source: http://www.securityfocus.com/bid/4875/info
A vulnerability has been reported in the scoadmin utility that may allow a local attacker to overwrite any file. The vulnerability is due to the predictable naming of temporary files used by scoadmin. When writing to temporary files, there are no checks to ensure that it does not already exist. Symbolic links will also be followed. This behaviour may be exploited by local attackers to corrupt arbitrary files.
ln -s /etc/passwd /tmp/tclerror.1195.log
If the process ID of the SCOadmin process is 1195, /etc/passwd will be overwritten.
{"id": "EDB-ID:21489", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Caldera OpenServer 5.0.5/5.0.6 SCOAdmin Symbolic Link Vulnerability", "description": "Caldera OpenServer 5.0.5/5.0.6 SCOAdmin Symbolic Link Vulnerability. CVE-2002-0887. Local exploit for sco platform", "published": "2002-05-29T00:00:00", "modified": "2002-05-29T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.exploit-db.com/exploits/21489/", "reporter": "Kevin Finisterre", "references": [], "cvelist": ["CVE-2002-0887"], "lastseen": "2016-02-02T16:35:56", "viewCount": 2, "enchantments": {"score": {"value": 5.1, "vector": "NONE", "modified": "2016-02-02T16:35:56", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2002-0887"]}, {"type": "osvdb", "idList": ["OSVDB:5060"]}], "modified": "2016-02-02T16:35:56", "rev": 2}, "vulnersScore": 5.1}, "sourceHref": "https://www.exploit-db.com/download/21489/", "sourceData": "source: http://www.securityfocus.com/bid/4875/info\r\n\r\nA vulnerability has been reported in the scoadmin utility that may allow a local attacker to overwrite any file. The vulnerability is due to the predictable naming of temporary files used by scoadmin. When writing to temporary files, there are no checks to ensure that it does not already exist. Symbolic links will also be followed. This behaviour may be exploited by local attackers to corrupt arbitrary files.\r\n\r\nln -s /etc/passwd /tmp/tclerror.1195.log\r\n\r\nIf the process ID of the SCOadmin process is 1195, /etc/passwd will be overwritten.\r\n\r\n\r\n", "osvdbidlist": ["5060"]}