what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SCOSA-2006.10.txt

SCOSA-2006.10.txt
Posted Mar 14, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 5.0.6 OpenServer 5.0.7 OpenServer 6.0.0 : Multiple System Libraries Vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 3799edee6ac32c542aede100f28a5107cb7f3c2ef49e8f8d016a6fb4ec946993

SCOSA-2006.10.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

SCO Security Advisory

Subject: OpenServer 5.0.6 OpenServer 5.0.7 OpenServer 6.0.0 : Multiple System Libraries Vulnerabilities
Advisory number: SCOSA-2006.10
Issue date: 2006 March 14
Cross reference: fz532924 fz532923 fz533164 fz533174 fz533390
CVE-2005-2491 CVE-2005-3183 CVE-2005-3185
______________________________________________________________________________


1. Problem Description

PCRE is prone to a heap-overflow vulnerability. This issue
is due to the library's failure to properly perform boundary
checks on user-supplied input before copying data to an
internal memory buffer. The impact of successful exploitation
of this vulnerability depends on the application and the user
credentials using the vulnerable library. A successful attack
may ultimately permit an attacker to control the contents of
critical memory control structures and write arbitrary data to
arbitrary memory locations. Integer overflow in pcre_compile.c
in Perl Compatible Regular Expressions (PCRE) before 6.2, as
used in multiple products such as Python, Ethereal, and PHP,
allows attackers to execute arbitrary code via quantifier
values in regular expressions, which leads to a heap-based
buffer overflow.

W3C Libwww is prone to multiple vulnerabilities. These issues
include a buffer overflow vulnerability and some issues related
to the handling of multipart/byteranges content. Libwww
5.4.0 is reported to be vulnerable. Other versions may
be affected as well. These issues may also be exploited
through other applications that implement the library. The
HTBoundary_put_block function in HTBound.c for W3C libwww
(w3c-libwww) allows remote servers to cause a denial of service
(segmentation fault) via a crafted multipart/byteranges MIME
message that triggers an out-of-bounds read.

GNU wget and cURL are prone to a buffer overflow vulnerability.
This issue is due to a failure in the applications to do
proper bounds checking on user supplied data before using
it in a memory copy operation. An attacker can exploit this
vulnerability to execute arbitrary code in the context of the
user utilizing the vulnerable application. Exploitation of this
vulnerability requires that NTLM authentication is enabled
in the affected clients. Stack-based buffer overflow in the
ntlm_output function in http-ntlm.c for (1) wget 1.10, (2)
curl 7.13.2, and (3) libcurl 7.13.2, and other products that
use libcurl, when NTLM authentication is enabled, allows remote
servers to execute arbitrary code via a long NTLM username.

The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2005-2491,
CVE-2005-3183, and CVE-2005-3185 to these issues.


2. Vulnerable Supported Versions

System Binaries
----------------------------------------------------------------------
OpenServer 5.0.6 libpcre, libwww, libcurl libraries in the
gwxlibs component
OpenServer 5.0.7 libpcre, libwww, libcurl libraries in the
gwxlibs component
OpenServer 6.0.0 libpcre, libwww, libcurl libraries in the
gwxlibs component


3. Solution

The proper solution is to install the latest packages.


4. OpenServer 5.0.6

4.1 Location of Fixed Binaries

ftp://ftp.sco.com/pub/openserver5/opensrc/gwxlibs-2.1.0Ba/gwxlibs210Ba_vol.tar


4.2 Verification

MD5 (gwxlibs210Ba_vol.tar) = 18213632bd0c5ff1e260eac90aae7033

md5 is available for download from
ftp://ftp.sco.com/pub/security/tools


4.3 Installing Fixed Binaries

Download and install the Supplemental Graphics, Web and X11
Libraries (gwxlibs) version 2.1.0Ba from:

ftp://ftp.sco.com/pub/openserver5/opensrc/gwxlibs-2.1.0Ba/

This supplement can be installed on the following
SCO OpenServer release(s):

SCO OpenServer Release 5.0.6 with RS506A and OSS646C

See:
ftp://ftp.sco.com/pub/openserver5/opensrc/gwxlibs-2.1.0Ba/gwxlibs-2.1.0Ba.txt


5. OpenServer 5.0.7

5.1 Location of Fixed Binaries

ftp://ftp.sco.com/pub/openserver5/507/mp/osr507mp4/osr507mp4_vol.tar


5.2 Verification

MD5 (osr507mp4_vol.tar) = 4c87d840ff5b43221258547d19030228

md5 is available for download from
ftp://ftp.sco.com/pub/security/tools


5.3 Installing Fixed Binaries

See the SCO OpenServer Release 5.0.7 Maintenance Pack 4 Release
and Installation Notes:

ftp://ftp.sco.com/pub/openserver5/507/mp/osr507mp4/osr507mp4.htm


6. OpenServer 6.0.0

6.1 Location of Fixed Binaries

ftp://ftp.sco.com/pub/openserver6/600/mp/osr600mp2/osr600mp2.iso


6.2 Verification

MD5 (osr600mp2.iso) = 7e560dcde374eb60df2b4a599ac20d8a

md5 is available for download from
ftp://ftp.sco.com/pub/security/tools


6.3 Installing Fixed Binaries

See the SCO OpenServer Release 6.0.0 Maintenance Pack 2 Release
and Installation Notes:

ftp://ftp.sco.com/pub/openserver6/600/mp/osr600mp2/osr600mp2.html


7. References

Specific references for this advisory:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3183
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185
http://www.securityfocus.com/bid/14620
http://www.securityfocus.com/bid/15035
http://www.securityfocus.com/bid/15102
http://securitytracker.com/id?1014744
http://securitytracker.com/id?1015057

SCO security resources:
http://www.sco.com/support/security/index.html

SCO security advisories via email
http://www.sco.com/support/forums/security.html

This security fix closes SCO incidents fz532924 fz532923 fz533164
fz533174 fz533390.


8. Disclaimer

SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended
to promote secure installation and use of SCO products.


______________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (UnixWare)

iD8DBQFEFynVaqoBO7ipriERAusBAJ449zh23lL5tq9yV2PpPqoGY3yiDQCfSCw9
/S2QKbSM8J+jGesfDrbV7wU=
=WXg5
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close