SCO OpenServer recon First Argument Local Overflow
2001-03-27T00:00:00
ID OSVDB:7647 Type osvdb Reporter KF(dotslash@snosoft.com) Modified 2001-03-27T00:00:00
Description
Vulnerability Description
A local overflow exists in OpenServer. The recon command fails to validate user-supplied arguments resulting in a buffer overflow. With a specially crafted request consisting of more than 1315 characters, an attacker can cause arbitrary code execution resulting in a loss of integrity.
Solution Description
Currently, there are no known workarounds or upgrades to correct this issue. However, SCO has released a patch to address this vulnerability.
Short Description
A local overflow exists in OpenServer. The recon command fails to validate user-supplied arguments resulting in a buffer overflow. With a specially crafted request consisting of more than 1315 characters, an attacker can cause arbitrary code execution resulting in a loss of integrity.
References:
Vendor Specific Advisory URL
Security Tracker: 1001180
Mail List Post: http://marc.theaimsgroup.com/?l=bugtraq&m=98575462712005&w=2
ISS X-Force ID: 6289
CVE-2001-0577
Bugtraq ID: 2560
{"id": "OSVDB:7647", "bulletinFamily": "software", "title": "SCO OpenServer recon First Argument Local Overflow", "description": "## Vulnerability Description\nA local overflow exists in OpenServer. The recon command fails to validate user-supplied arguments resulting in a buffer overflow. With a specially crafted request consisting of more than 1315 characters, an attacker can cause arbitrary code execution resulting in a loss of integrity.\n## Solution Description\nCurrently, there are no known workarounds or upgrades to correct this issue. However, SCO has released a patch to address this vulnerability.\n## Short Description\nA local overflow exists in OpenServer. The recon command fails to validate user-supplied arguments resulting in a buffer overflow. With a specially crafted request consisting of more than 1315 characters, an attacker can cause arbitrary code execution resulting in a loss of integrity.\n## References:\n[Vendor Specific Advisory URL](ftp://ftp.sco.com/pub/SSE/sse072c/sse072c.ltr)\nSecurity Tracker: 1001180\nMail List Post: http://marc.theaimsgroup.com/?l=bugtraq&m=98575462712005&w=2\nISS X-Force ID: 6289\n[CVE-2001-0577](https://vulners.com/cve/CVE-2001-0577)\nBugtraq ID: 2560\n", "published": "2001-03-27T00:00:00", "modified": "2001-03-27T00:00:00", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://vulners.com/osvdb/OSVDB:7647", "reporter": "KF(dotslash@snosoft.com)", "references": [], "cvelist": ["CVE-2001-0577"], "type": "osvdb", "lastseen": "2017-04-28T13:20:02", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "385000859d56cf0ce141bf9d66da543b"}, {"key": "bulletinFamily", "hash": "f9fa10ba956cacf91d7878861139efb9"}, {"key": "cvelist", "hash": "602f9bceb6f020acdfd08121d721f97d"}, {"key": "cvss", "hash": "cfd16da9581e0c21db590e40dfd9e493"}, {"key": "description", "hash": "bc0e398622aa3e649dace74fa93fdb9d"}, {"key": "href", "hash": "272a5b3ab85c7f653a2647be39ba1bc7"}, {"key": "modified", "hash": "05bfca0d2e10fe86c85bf2fbd3007831"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "05bfca0d2e10fe86c85bf2fbd3007831"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "5dc8825c36833e72faaa7fddae7ff3da"}, {"key": "title", "hash": "af822751cab313bf3a13c01008ace74e"}, {"key": "type", "hash": "1327ac71f7914948578f08c54f772b10"}], "hash": "09b3570cd0771e3f2ed11f7d22149e0867dc8148a844513997dd4accaf9c0bc6", "viewCount": 0, "objectVersion": "1.2", "affectedSoftware": [{"name": "OpenServer", "operator": "eq", "version": "5.0.6"}], "enchantments": {"vulnersScore": 7.2}}
{"result": {"cve": [{"id": "CVE-2001-0577", "type": "cve", "title": "CVE-2001-0577", "description": "recon in SCO OpenServer 5.0 through 5.0.6 can allow a local attacker to gain additional privileges via a buffer overflow attack in the first command line argument.", "published": "2001-08-22T00:00:00", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0577", "cvelist": ["CVE-2001-0577"], "lastseen": "2017-12-19T12:21:02"}], "exploitdb": [{"id": "EDB-ID:20742", "type": "exploitdb", "title": "SCO Open Server 5.0.6 recon Buffer Overflow Vulnerability", "description": "SCO Open Server 5.0.6 recon Buffer Overflow Vulnerability. CVE-2001-0577. Dos exploit for sco platform", "published": "2001-03-27T00:00:00", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.exploit-db.com/exploits/20742/", "cvelist": ["CVE-2001-0577"], "lastseen": "2016-02-02T14:54:41"}]}}