-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ SCO Security Advisory Subject: UnixWare 7.1.1 Open UNIX 8.0.0 UnixWare 7.1.3 : REVISED: Lax permissions on /dev/X Advisory number: CSSA-2003-SCO.4.2 Issue date: 2003 March 12 Cross reference: CSSA-2003-SCO.4 CSSA-2003-SCO.4.1 ______________________________________________________________________________ 1. Problem Description The /dev/X directory is world readable and writable, and the files in it are also world readable and writable. Denial-of-Service attacks are possible, as well as possible data hijacking. The X server sets these permissions when it starts up, so there is no workaround for this issue. The 4.1 update of this advisory fixed an install problem on Open UNIX 8 and UnixWare 7.1.3. The 4.2 update of this advisory updates the Open UNIX 8 packages to also fix security issues related to insecure popen calls and buffer overflows. These vulnerabilities were already fixed in the UnixWare 7.1.1 and 7.1.3 packages released with the 4.1 advisory. 2. Vulnerable Supported Versions System Binaries ---------------------------------------------------------------------- UnixWare 7.1.1 Standard X Distribution Open UNIX 8.0.0 Standard X Distribution UnixWare 7.1.3 Standard X Distribution 3. Solution The proper solution is to install the latest packages. 4. UnixWare 7.1.1 4.1 Location of Fixed Binaries ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.4.2 4.2 Verification MD5 (basex711.pkg.Z) = 510888d562f6c2249555fefdae94d49d MD5 (xserver711.pkg.Z) = 74797f12d6e3e80300980854050f62ef md5 is available for download from ftp://ftp.sco.com/pub/security/tools 4.3 Installing Fixed Binaries Upgrade the affected binaries with the following sequence: Download basex711.pkg.Z to the /var/spool/pkg directory Download xserver711.pkg.Z to the /var/spool/pkg directory # uncompress /var/spool/pkg/basex711.pkg.Z # pkgadd -d /var/spool/pkg/basex711.pkg # uncompress /var/spool/pkg/xserver711.pkg.Z # pkgadd -d /var/spool/pkg/xserver711.pkg 5. Open UNIX 8.0.0 5.1 Location of Fixed Binaries ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.4.2 5.2 Verification MD5 (basex800.pkg) = 835c516771b298be1f7c25408fbe788e MD5 (xserver800.pkg) = cc26992e7022b778b0b84164f113656e md5 is available for download from ftp://ftp.sco.com/pub/security/tools 5.3 Installing Fixed Binaries Upgrade the affected binaries with the following sequence: Download basex800.pkg to the /var/spool/pkg directory Download xserver800.pkg to the /var/spool/pkg directory # pkgadd -d /var/spool/pkg/basex800.pkg # pkgadd -d /var/spool/pkg/xserver800.pkg 6. UnixWare 7.1.3 6.1 Location of Fixed Binaries ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.4.2 6.2 Verification MD5 (basex713.pkg) = 30feecb01b9cb2ad3477840b25896e0d MD5 (xserver713.pkg) = a97371c5e1f0d3e147d05c6ebb71b3b8 md5 is available for download from ftp://ftp.sco.com/pub/security/tools 6.3 Installing Fixed Binaries Upgrade the affected binaries with the following sequence: Download basex713.pkg to the /var/spool/pkg directory Download xserver713.pkg to the /var/spool/pkg directory # pkgadd -d /var/spool/pkg/basex713.pkg # pkgadd -d /var/spool/pkg/xserver713.pkg 7. References Specific references for this advisory: none SCO security resources: http://www.sco.com/support/security/index.html This security fix closes SCO incidents sr874992, sr874607, fz527440, erg712231, sr850806, fz518676, erg711819. 8. Disclaimer SCO is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of SCO products. ______________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (SCO_SV) Comment: For info see http://www.gnupg.org iEYEARECAAYFAj5veBcACgkQaqoBO7ipriFNnQCgihkmoE7l+HtQUmOtK6au3xqR bRkAnRTu5N/NXjZnZZco31TP6wppMK/r =TJHM -----END PGP SIGNATURE-----