[21278] in bugtraq
Security Update: [CSSA-2001-SCO.5] UnixWare: packaging tool exploits
daemon@ATHENA.MIT.EDU (sco-security@caldera.com)
Mon Jul 2 03:33:19 2001
Message-Id: <200106292155.f5TLtVt25835@ergo.uss.sco.com>
To: bugtraq@securityfocus.com, security-announce@lists.securityportal.com,
an=@sco.COM
From: sco-security@caldera.com
Date: Fri, 29 Jun 2001 14:55:31 -0700
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="ZGiS0Q5IWpPtfppv"
Content-Disposition: inline
--ZGiS0Q5IWpPtfppv
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
To: bugtraq@securityfocus.com security-announce@lists.securityportal.com an=
nounce@lists.caldera.com
___________________________________________________________________________
Caldera International, Inc. Security Advisory
Subject: UnixWare: packaging tool exploits
Advisory number: CSSA-2001-SCO.5
Issue date: 2001 June 29
Cross reference:
___________________________________________________________________________
1. Problem Description
The packaging tools can be exploited to print /etc/shadow,
leading to a probable root compromise.
2. Vulnerable Versions
Operating System Version Affected Files
------------------------------------------------------------------
UnixWare 7 All /usr/bin/pkginfo
/usr/bin/pkgparam
/usr/bin/pkgtrans
/usr/sbin/pkgadd
/usr/sbin/pkgcat
/usr/sbin/pkginstall
/usr/sbin/pkgrm
=09
3. Workaround
None.
4. UnixWare 7
4.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/security/unixware/sr847997/
4.2 Verification
md5 checksums:
=09
5d75084d724882c4baad12a255c00776 erg711743.Z
md5 is available for download from
ftp://ftp.sco.com/pub/security/tools/
4.3 Installing Fixed Binaries
Upgrade the affected binaries with the following commands:
# uncompress /tmp/erg711713a.Z
# pkgadd -d /tmp/erg711713a
5. References
http://www.technotronic.com/xnec/
http://www.calderasystems.com/support/security/index.html
6. Disclaimer
Caldera International, Inc. is not responsible for the misuse
of any of the information we provide on our website and/or
through our security advisories. Our advisories are a service
to our customers intended to promote secure installation and
use of Caldera International, Inc. products.
7.Acknowledgements
Caldera International wishes to thank Brock Tellier
(btellier@usa.net) for his analysis and help concerning this
issue.
In addition, an acknowledgement to Mr. Tellier was
inadvertently omitted from advisory [CSSA-2001-SCO.1].
=20
___________________________________________________________________________
--ZGiS0Q5IWpPtfppv
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjs8+VMACgkQaqoBO7ipriFDhACfciJYFy0iHrWMrqiVbSZLlO2Y
bhsAn3ZT97+2t3JqNszwAtxUJRtbWLON
=YcoZ
-----END PGP SIGNATURE-----
--ZGiS0Q5IWpPtfppv--