To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]

______________________________________________________________________________

                Caldera International, Inc.  Security Advisory

Subject:                UnixWare 7.1.1 Open UNIX 8.0.0 : rpc.ttdbserverd file creation 
and deletion vulnerabilities
Advisory number:        CSSA-2002-SCO.28
Issue date:             2002 July 11
Cross reference:
______________________________________________________________________________


1. Problem Description

        Several security bugs were discovered in the rpc.ttdbserverd
        program that allow an attacker to overwrite memory in the
        program as well as force the program to create and delete
        arbitrary files on the system. Some of these vulnerabilities
        are remotely exploitable.


2. Vulnerable Supported Versions

        System                          Binaries
        ----------------------------------------------------------------------
        UnixWare 7.1.1                  /usr/dt/bin/rpc.ttdbserverd
        Open UNIX 8.0.0                 /usr/dt/bin/rpc.ttdbserverd


3. Solution

        The proper solution is to install the latest packages.


4. UnixWare 7.1.1

        4.1 Location of Fixed Binaries

        ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28


        4.2 Verification

        MD5 (erg712073.pkg.Z) = 9b7f2f606d658ed51d590737daf9e117

        md5 is available for download from
                ftp://ftp.caldera.com/pub/security/tools


        4.3 Installing Fixed Binaries

        Upgrade the affected binaries with the following commands:

        Download erg712073.pkg.Z to the /var/spool/pkg directory

        # uncompress /var/spool/pkg/erg712073.pkg.Z
        # pkgadd -d /var/spool/pkg/erg712073.pkg


5. Open UNIX 8.0.0

        5.1 Location of Fixed Binaries

        ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28


        5.2 Verification

        MD5 (erg712073.pkg.Z) = 9b7f2f606d658ed51d590737daf9e117

        md5 is available for download from
                ftp://ftp.caldera.com/pub/security/tools


        5.3 Installing Fixed Binaries

        Upgrade the affected binaries with the following commands:

        Download erg712073.pkg.Z to the /var/spool/pkg directory

        # uncompress /var/spool/pkg/erg712073.pkg.Z
        # pkgadd -d /var/spool/pkg/erg712073.pkg


6. References

        Specific references for this advisory:
                CORE ST advisory CORE-20020528
                http://www.cert.org/advisories/CA-2002-20.html

        Caldera security resources:
                http://www.caldera.com/support/security/index.html

        This security fix closes Caldera incidents sr865685, fz521202,
        erg712073.


7. Disclaimer

        Caldera International, Inc. is not responsible for the
        misuse of any of the information we provide on this website
        and/or through our security advisories. Our advisories are
        a service to our customers intended to promote secure
        installation and use of Caldera products.


8. Acknowledgements

        The vulnerabilities were discovered and researched by Ricardo
        Quesada of the CORE IMPACT team at CORE Security Technologies.

______________________________________________________________________________

Attachment: msg08403/pgp00000.pgp
Description: PGP signature

Reply via email to