First published: Tue Nov 18 2003(Updated: )
SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
UNIX | =8.0 | |
Xinuos UnixWare | =7.1.1 | |
Xinuos UnixWare | =7.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0937 has been classified as a medium severity vulnerability.
To fix CVE-2003-0937, upgrade to the latest versions of SCO UnixWare or Open UNIX that do not contain this vulnerability.
CVE-2003-0937 affects local users on SCO UnixWare versions 7.1.1, 7.1.3, and Open UNIX 8.0.0.
CVE-2003-0937 allows local users to bypass protections for the 'as' address space file by using procfs.
CVE-2003-0937 cannot be exploited remotely; it requires local access to the system.