Overview
A vulnerability in a program supplied with the SCO OpenServer operating system may allow local attackers to gain elevated privileges.
Description
SCO OpenServer is a UNIX-like operating system for Intel and AMD platforms. The 'scosession' session handling component, which is responsible for starting and stopping X server sessions, contains a flaw in the handling of command-line arguments which may allow a local authenticated attacker to gain elevated privileges. This applies to SCO OpenServer 5.0.6 and 5.0.7. |
Impact
Local authenticated users may gain elevated privileges on affected platforms. |
Solution
Apply an update Updates for SCO OpenServer 5.0.6 and 5.0.7 are available at this time. More information can be found in SCO Security Advisory SCOSA-2005.5. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to SCO Security for reporting this vulnerability, who in turn credit Joel Soderberg and Christer Oberg of Deprotect with the discovery.
This document was written by Ken MacInnis.
Other Information
CVE IDs: | CVE-2003-1021 |
Severity Metric: | 7.29 |
Date Public: | 2005-01-25 |
Date First Published: | 2005-02-21 |
Date Last Updated: | 2005-02-21 21:25 UTC |
Document Revision: | 12 |