Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:3755
HistoryNov 14, 2002 - 12:00 a.m.

Security Update: [CSSA-2002-SCO.42] UnixWare 7.1.1 Open UNIX 8.0.0 : in.talkd format string vulnerabilities

2002-11-1400:00:00
vulners.com
7

0.005 Low

EPSS

Percentile

77.5%

To: [email protected] [email protected] [email protected]
[email protected]


                    SCO Security Advisory

Subject: UnixWare 7.1.1 Open UNIX 8.0.0 : in.talkd format string
vulnerabilities
Advisory number: CSSA-2002-SCO.42
Issue date: 2002 November 12
Cross reference:


  1. Problem Description

      The in.talkd program is vulnerable to a format string bug
      which can be exploited remotely. An attacker can request
      a talk session with a crafted luser field and be able to
      write memory and gain control of the flow of the in.talkd.
      This vulnerability can also be exploited with the clt_addr
      field and its resolved name (in conjuction with a DNS).
    
  2. Vulnerable Supported Versions

     System                          Binaries
     ----------------------------------------------------------------------
     UnixWare 7.1.1                  /usr/sbin/in.otalkd
                                     /usr/sbin/in.talkd
     Open UNIX 8.0.0                 /usr/sbin/in.otalkd
                                     /usr/sbin/in.talkd
    
  3. Solution

     The proper solution is to install the latest packages.
    
  4. UnixWare 7.1.1

     4.1 Location of Fixed Binaries
    
     ftp://ftp.sco.com/pub/updates/OpenUNIX/CSSA-2002-SCO.42
    
    
     4.2 Verification
    
     MD5 (erg712055.pkg.Z) = 5cd91b194857bb3149efee8bf6e3e804
    
     md5 is available for download from
             ftp://ftp.sco.com/pub/security/tools
    
    
     4.3 Installing Fixed Binaries
    
     Upgrade the affected binaries with the following sequence:
    
     Download erg712055.pkg.Z to the /var/spool/pkg directory
    
     # uncompress /var/spool/pkg/erg712055.pkg.Z
     # pkgadd -d /var/spool/pkg/erg712055.pkg
    
  5. Open UNIX 8.0.0

     5.1 Location of Fixed Binaries
    
     ftp://ftp.sco.com/pub/updates/OpenUNIX/CSSA-2002-SCO.42
    
    
     5.2 Verification
    
     MD5 (erg712055.pkg.Z) = 5cd91b194857bb3149efee8bf6e3e804
    
     md5 is available for download from
             ftp://ftp.sco.com/pub/security/tools
    
    
     5.3 Installing Fixed Binaries
    
     Upgrade the affected binaries with the following sequence:
    
     Download erg712055.pkg.Z to the /var/spool/pkg directory
    
     # uncompress /var/spool/pkg/erg712055.pkg.Z
     # pkgadd -d /var/spool/pkg/erg712055.pkg
    
  6. References

     Specific references for this advisory:
             http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1010
             http://www.ngsec.com/docs/advisories/NGSEC-2002-3.txt
    
     SCO security resources:
             http://www.sco.com/support/security/index.html
    
     This security fix closes SCO incidents sr864879, fz521053,
     erg712055.
    
  7. Disclaimer

     SCO is not responsible for the misuse of any of the information
     we provide on this website and/or through our security
     advisories. Our advisories are a service to our customers
     intended to promote secure installation and use of SCO
     products.
    
  8. Acknowledgements

     It is difficult to say who actually discovered this
     vulnerability. There are many candidates.
    

0.005 Low

EPSS

Percentile

77.5%

Related for SECURITYVULNS:DOC:3755