CVE-2003-0937

Current Description

SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.

Basic Data

PublishedDecember 15, 2003
Last ModifiedOctober 18, 2016
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score4.6
SeverityMEDIUM
Exploitability Score3.9
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSScoOpen Unix8.0*******
    2.3OSScoUnixware7.1.1*******
    2.3OSScoUnixware7.1.3*******

Vulnerable Software List

VendorProductVersions
Sco Open Unix 8.0
Sco Unixware 7.1.1, 7.1.3

References

NameSourceURLTags
CSSA-2003-SCO.32ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.32/CSSA-2003-SCO.32.txtSCOPatch Vendor Advisory
20031112 Insecure handling of procfs descriptors in UnixWare can lead to local privilege escalation.http://marc.info/?l=bugtraq&m=106865297403687&w=2BUGTRAQ
http://www.texonet.com/advisories/TEXONET-20031024.txthttp://www.texonet.com/advisories/TEXONET-20031024.txtMISCPatch Vendor Advisory