Security Update: [CSSA-2001-SCO.30] Open UNIX, UnixWare 7: DCE SPC library buffer overflow

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



To: bugtraq@securityfocus.com security-announce@lists.securityportal.com announce@lists.caldera.com scoannmod@xenitec.on.ca

___________________________________________________________________________

	    Caldera International, Inc. Security Advisory

Subject:		Open UNIX, UnixWare 7: DCE SPC library buffer overflow
Advisory number: 	CSSA-2001-SCO.30
Issue date: 		2001 November 6
Cross reference:
___________________________________________________________________________


1. Problem Description
	
	The DCE SPC library is vulnerable to a network buffer overflow
	attack. This bug manifests itself in dtspcd.
	

2. Vulnerable Versions

	Operating System	Version		Affected Files
	------------------------------------------------------------------
	UnixWare 7		All		/usr/dt/lib/libDtSvc.so.1
	Open UNIX		8.0.0		/usr/dt/lib/libDtSvc.so.1


3. Workaround

	None.


4. UnixWare 7, Open UNIX 8

  4.1 Location of Fixed Binaries

	ftp://stage.caldera.com/pub/security/openunix/CSSA-2001-SCO.30/


  4.2 Verification

	md5 checksums:
	
	8d5c98f761dd68aa108794d8ed5c70f1	erg711881.Z


	md5 is available for download from

		ftp://stage.caldera.com/pub/security/tools/


  4.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following commands:

	# uncompress /tmp/erg711881.Z
	# pkgadd -d /tmp/erg711881


5. References

	CERT / ISS draft advisory VU#172583

	This and other advisories are located at
		http://stage.caldera.com/support/security

	This advisory addresses Caldera Security internal incidents
	sr854831, fz519245, and erg711881 


6. Disclaimer

	Caldera International, Inc. is not responsible for the misuse
	of any of the information we provide on our website and/or
	through our security advisories. Our advisories are a service
	to our customers, intended to promote the secure installation
	and use of Caldera International products.


7. Acknowledgements

	This vulnerability was discovered and researched by Chris
	Spencer of the ISS X-Force.

	 
___________________________________________________________________________

PGP signature


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux