[13092] in bugtraq

home help back first fref pref prev next nref lref last post

FYI, SCO Security patches available.

daemon@ATHENA.MIT.EDU (Aaron Sigel)
Fri Dec 24 13:22:31 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.SV4.3.96.991223222824.1623B-100000@ripley.london.sco.com>
Date:         Thu, 23 Dec 1999 22:31:03 +0000
Reply-To: Aaron Sigel <aarons@SCO.COM>
From: Aaron Sigel <aarons@SCO.COM>
X-To:         bugtraq@security-focus.com
To: BUGTRAQ@SECURITYFOCUS.COM

Greetings,

        I just wanted to point out that the patches to the following
problems are now available from the SCO Security website.

        - UnixWare read/modify users' mail
        - UnixWare gain root with non su/gid binaries
        - UnixWare coredumps follow symlinks
        - UnixWare pkg* command exploits
        - Fundamental flaw in UnixWare 7 security
		(listed on the page as "Privileged process security issue")
        - UnixWare privileged process coredumps
        - UnixWare i2odialogd buffer overflow

        The SCO Security website is located at:

        http://www.sco.com/security


--
Aaron Sigel, Secure Technologies Group, SCO - aarons@sco.com

home help back first fref pref prev next nref lref last post