|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> General >> SCO OpenServer multiple vulnerabilities Vulnerability Assessment Details
|
SCO OpenServer multiple vulnerabilities |
||
Checks the remote SCO OpenServer Detailed Explanation for this Vulnerability Assessment OpenServer 5.0.7, OpenServer 5.0.6, and OpenServer 5.0.5 are vulnerable to two (2) distinct exploits. Namely, 1) Xsco can be locally exploited by any valid user in order to escalate their rights to 'root'. The bug is due to improper input handling when running the command line switch '-co'. 2) There is a vulnerability in the MIT-SHM extension within all X servers that are running as root. Any user with local X access can exploit the MIT-SHM extension and gain read/write access to any shared memory segment on the system. *** This test relied on the banner of the remote system *** to acertain that it is a SCO Unix server, so this alert *** might be a false positive More information can be found at: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0158 http://marc.theaimsgroup.com/?l=bugtraq&m=101776858410652&w=2 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0164 http://marc.theaimsgroup.com/?l=bugtraq&m=103547625009363&w=2 http://www.securityfocus.com/bid/4396 Solution: Install the patched binaries from ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.26 Network Security Threat Level: High Networks Security ID: 4396, 4985 Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Tenable Network Security |
||
Cables, Connectors |
$599.99
Dell Precision T3600 | Xeon E5 | 16GB | GPU | 128GB SSD | Win 10 Pro
$115.00
$80.00
Dell PowerEdge R730 8SFF 2x E5-2660 v3 = 20 Cores 128/256GB 3x 600/900GB H730
$349.99
Intel Xeon E5-2680 v4 2.4GHz 35MB 14-Core 120W LGA2011-3 SR2N7
$17.99
Intel Xeon Gold 6140 SR3AX 2.3GHz 18-Core Processor CPU
$44.99
HP Z4G4 Intel Xeon W2133-3.6 GHz, 256 NVME, 6TB HDD, 32GB RAM P620 NO OS
$265.00
Intel Xeon E5-2697A V4 2.6GHz CPU Processor 16-Core Socket LGA2011 SR2K1
$39.99
Intel Xeon E5-2697 v2 2.7GHz 30M 12-Core LGA2011 CPU Processor SR19H
$27.99
DELL PowerEdge R730 Server 2x E5-2690v3 2.6GHz =24 Cores 32GB H730 4xRJ45
$274.00
|
||
No Discussions have been posted on this vulnerability. |