exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

SCOSA-2005.18.txt

SCOSA-2005.18.txt
Posted Apr 17, 2005
Site sco.com

SCO Security Advisory - The CDE dtlogin utility has a double-free vulnerability in the X Display Manager Control Protocol (XDMCP). By sending a specially-crafted XDMCP packet to a vulnerable system, a remote attacker could obtain sensitive information, cause a denial of service or execute arbitrary code on the system.

tags | advisory, remote, denial of service, arbitrary, protocol
advisories | CVE-2004-0368
SHA-256 | 24bb6cc7c24a3053840cf6a4090a3bd2cd80da9b00448e52d83e306efef43c75

SCOSA-2005.18.txt

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



______________________________________________________________________________

SCO Security Advisory

Subject: UnixWare 7.1.4 UnixWare 7.1.3 UnixWare 7.1.1 : CDE dtlogin unspecified double free
Advisory number: SCOSA-2005.18
Issue date: 2005 April 7
Cross reference: sr890079 fz529303 erg712592 CAN-2004-0368 CERT VU#179804
______________________________________________________________________________


1. Problem Description

The Common Desktop Environment (CDE) dtlogin utility is
used to log into a CDE session. The CDE dtlogin utility has
a double-free vulnerability in the X Display Manager Control
Protocol (XDMCP). By sending a specially-crafted XDMCP
packet to a vulnerable system, a remote attacker could
obtain sensitive information, cause a denial of service or
execute arbitrary code on the system.

CERT Vulnerability Note VU#179804, Common Desktop Environment
(CDE) dtlogin improperly deallocates memory at
http://www.kb.cert.org/vuls/id/179804.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2004-0368 to this issue.


2. Vulnerable Supported Versions

System Binaries
----------------------------------------------------------------------
UnixWare 7.1.4 /usr/dt/bin/dtgreet
/usr/dt/bin/dtlogin
/usr/dt/lib/libDtLogin.so.1

UnixWare 7.1.3 /usr/dt/bin/dtgreet
/usr/dt/bin/dtlogin
/usr/dt/lib/libDtLogin.so.1

UnixWare 7.1.1 See Maintenance Pack 5 notes


3. Solution

The proper solution is to install the latest packages.

4. UnixWare 7.1.4

4.1 Location of Fixed Binaries

ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.18

4.2 Verification

MD5 (erg712592.pkg.Z) = d3714b22a624db25740f5539c063d407

md5 is available for download from
ftp://ftp.sco.com/pub/security/tools


4.3 Installing Fixed Binaries

Upgrade the affected binaries with the following sequence:

Download erg712592.pkg.Z to the /var/spool/pkg directory

# uncompress /var/spool/pkg/erg712592.pkg.Z
# pkgadd -d /var/spool/pkg/erg712592.pkg


5. UnixWare 7.1.3

5.1 Location of Fixed Binaries

ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.18


5.2 Verification

MD5 (erg712592.713.pkg.Z) = fc8d0c4f0ebdcf65504d1b4985c7ba52

md5 is available for download from
ftp://ftp.sco.com/pub/security/tools


5.3 Installing Fixed Binaries

Upgrade the affected binaries with the following sequence:

Download erg712592.713.pkg.Z to the /var/spool/pkg directory

# uncompress /var/spool/pkg/erg712592.713.pkg.Z
# pkgadd -d /var/spool/pkg/erg712592.713.pkg


6. UnixWare 7.1.1 uw711mp5

6.1 Location of Fixed Binaries

The fixes are available in SCO UnixWare Release 7.1.1
Maintenance Pack 5 or later. See

ftp://ftp.sco.com/pub/unixware7/uw711pk/uw711mp5.txt
and
ftp://ftp.sco.com/pub/unixware7/uw711pk/uw711mp5_errata.txt

6.2 Verification

MD5 (uw711mp5.cpio.Z) = 50bd66b7d57b2025da9dca4010d0ab1a

md5 is available for download from
ftp://ftp.sco.com/pub/security/tools

6.3 Installing Fixed Binaries

See uw711mp5.txt and uw711mp5_errata.txt for install instructions.


7. References

Specific references for this advisory:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0368

SCO security resources:
http://www.sco.com/support/security/index.html

SCO security advisories via email
http://www.sco.com/support/forums/security.html

This security fix closes SCO incidents sr890079 fz529303
erg712592.


8. Disclaimer

SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers
intended to promote secure installation and use of SCO
products.


9. Acknowledgments

SCO would like to thank Dave Aitel

______________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (SCO/SYSV)

iD8DBQFCVYa9aqoBO7ipriERAiKPAJ9tygBRSAMRNqWS2jRKE5PWyJF4+gCff8Em
Hvk5XLjwEg89hCPj96JJ1MM=
=dRsT
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close