CVE-2003-0937

SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:sco:open_unix:8.0:*:*:*:*:*:*:*
cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*
cpe:2.3:o:sco:unixware:7.1.3:*:*:*:*:*:*:*

History

20 Nov 2024, 23:45

Type Values Removed Values Added
References () ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.32/CSSA-2003-SCO.32.txt - Patch, Vendor Advisory () ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.32/CSSA-2003-SCO.32.txt - Patch, Vendor Advisory
References () http://marc.info/?l=bugtraq&m=106865297403687&w=2 - () http://marc.info/?l=bugtraq&m=106865297403687&w=2 -
References () http://www.texonet.com/advisories/TEXONET-20031024.txt - Patch, Vendor Advisory, URL Repurposed () http://www.texonet.com/advisories/TEXONET-20031024.txt - Patch, Vendor Advisory, URL Repurposed

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) http://www.texonet.com/advisories/TEXONET-20031024.txt - Patch, Vendor Advisory (MISC) http://www.texonet.com/advisories/TEXONET-20031024.txt - Patch, Vendor Advisory, URL Repurposed

Information

Published : 2003-12-15 05:00

Updated : 2024-11-20 23:45


NVD link : CVE-2003-0937

Mitre link : CVE-2003-0937

CVE.ORG link : CVE-2003-0937


JSON object : View

Products Affected

sco

  • unixware
  • open_unix