From security@caldera.com Tue Apr 9 18:44:26 2002 From: security@caldera.com To: bugtraq@securityfocus.com, announce@lists.caldera.com, scoannmod@xenitec.on.ca Date: Mon, 8 Apr 2002 17:47:13 -0700 Subject: Security Update: [CSSA-2002-SCO.14] Open UNIX 8.0.0 UnixWare 7.1.1 : X server allows access to any shared memory on the system To: bugtraq@securityfocus.com announce@lists.caldera.com scoannmod@xenitec.on.ca ______________________________________________________________________________ Caldera International, Inc. Security Advisory Subject: Open UNIX 8.0.0 UnixWare 7.1.1 : X server allows access to any shared memory on the system Advisory number: CSSA-2002-SCO.14 Issue date: 2002 April 08 Cross reference: ______________________________________________________________________________ 1. Problem Description Any user with local X access can exploit the MIT-SHM extension and gain read/write access to any shared memory segment on the system. 2. Vulnerable Supported Versions System Package ---------------------------------------------------------------------- Open UNIX 8.0.0 xserver UnixWare 7.1.1 xserver 3. Solution The proper solution is to install the latest packages. 4. Open UNIX 8.0.0 4.1 Location of Fixed Binaries ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.14 4.2 Verification MD5 (xserver.800a.pkg) = 471bd0d4c43b32d4b04003d78a218c97 md5 is available for download from ftp://stage.caldera.com/pub/security/tools/ 4.3 Installing Fixed Binaries Upgrade the affected binaries with the following commands: Download xserver.800a.pkg to the /var/spool/pkg directory # pkgadd -d /var/spool/pkg/xserver.800a.pkg 5. UnixWare 7.1.1 5.1 Location of Fixed Binaries ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.14 5.2 Verification MD5 (xserver.711b.pkg) = 545aafcdcfff532ed25dbffea0d06336 md5 is available for download from ftp://stage.caldera.com/pub/security/tools/ 5.3 Installing Fixed Binaries Upgrade the affected binaries with the following commands: Download xserver.711b.pkg to the /var/spool/pkg directory # pkgadd -d /var/spool/pkg/xserver.711b.pkg 6. References Specific references for this advisory: none Caldera UNIX security resources: http://stage.caldera.com/support/security/ Caldera OpenLinux security resources: http://www.caldera.com/support/security/index.html This security fix closes Caldera incidents sr860994, fz520243 and erg711973. 7. Disclaimer Caldera International, Inc. is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of Caldera products. 8. Acknowledgements Roberto Zunino discovered and researched this vulnerability. ______________________________________________________________________________ [Part 2, Application/PGP-SIGNATURE 245bytes] [Unable to print this part]