-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ SCO Security Advisory Subject: UnixWare 7.1.4 UnixWare 7.1.3 UnixWare 7.1.1 : cscope local attacker can remove arbitrary files Advisory number: SCOSA-2004.21 Issue date: 2004 December 09 Cross reference: sr892179 fz530500 erg712738 CAN-2004-0996 ______________________________________________________________________________ 1. Problem Description Cscope is a developer's tool for browsing source code. Cscope creates temporary files with an easily predictable file name. A local attacker could exploit this vulnerability and possibly gain elevated privileges on the system. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following name CAN-2004-0996 to this issue. 2. Vulnerable Supported Versions System Binaries ---------------------------------------------------------------------- UnixWare 7.1.4 /usr/ccs/bin/cscope UnixWare 7.1.3 /usr/ccs/bin/cscope UnixWare 7.1.1 /usr/ccs/bin/cscope 3. Solution The proper solution is to install the latest packages. 4. UnixWare 7.1.4 / UnixWare 7.1.3 / UnixWare 7.1.1 4.1 Location of Fixed Binaries ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.21 4.2 Verification MD5 (erg712738.pkg.Z) = e8c58dab51cf281cf9f42dbaff363573 md5 is available for download from ftp://ftp.sco.com/pub/security/tools 4.3 Installing Fixed Binaries Upgrade the affected binaries with the following sequence: Download erg712738.pkg.Z to the /var/spool/pkg directory # uncompress /var/spool/pkg/erg712738.pkg.Z # pkgadd -d /var/spool/pkg/erg712738.pkg 5. References Specific references for this advisory: http://xforce.iss.net/xforce/xfdb/18125 http://www.securityfocus.com/bid/11697 http://marc.theaimsgroup.com/?l=bugtraq&m=110133485519690&w=2 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0996 SCO security resources: http://www.sco.com/support/security/index.html SCO security advisories via email http://www.sco.com/support/forums/security.html This security fix closes SCO incidents sr892179 fz530500 erg712738. 6. Disclaimer SCO is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of SCO products. 7. Acknowledgments SCO would like to thank Gangstuck / Psirac who disclosed this vulnerability. Jeremy Bae from STG Security Inc also disclosed this vulnerability to the vendor. ______________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (SCO/UNIX_SVR5) iD8DBQFBuKRNaqoBO7ipriERAl2zAKCNs0ACaFngymgmvl3c4hBE6cjfZACgnwHu V5etCcnxfrBKvAOXn5/8aYA= =DAmQ -----END PGP SIGNATURE-----