CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
5.3%
There is a vulnerability in the Common Desktop Environment (CDE) for UNIX systems which can allow a local user to gain root privileges.
The Common Desktop Environment (CDE) is a standard desktop environment for UNIX based systems. CDE libDtHelp contains a buffer overflow that can be exploited by a local user. By modifying the DTHELPUSERSEARCHPATH or DTHELPSEARCHPATH environment variables and invoking Help an attacker can gain elevated privileges. For example, since dtprintinfo is commonly setuid root, it may be exploited by a local user to gain root privileges. Other programs that run with elevated privileges and link libDtHelp are also potential attack vectors.
An authenticated local user may be able to execute arbitrary code with root privileges. The attacker may also be able to crash vulnerable programs causing a denial of service.
Apply Patch or Upgrade
Apply a patch or upgrade as advised by your vendor. See the Systems Affected section for more information.
575804
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: October 09, 2003 Updated: December 03, 2003
Affected
============================================== Hewlett-Packard Company
SOURCE: Hewlett-Packard Company Software Security Response Team (SSRT)
Date: November 4, 2003 CROSS REFERENCE ID: SSRT3657
Hewlett Packard is currently investigating the potential impact to HP released operating system software.
HP will provide notice of the availability of any necessary patches through standard security bulletin announcements and be available from your normal HP Services support channel.
To report any security issue for any HP software products send email to [email protected]
The vendor has not provided us with any further information regarding this vulnerability.
Please see HPSBUX0311-297 / SSRT3657 for more information.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).
Notified: October 09, 2003 Updated: November 04, 2003
Affected
IBM eServer Platform Response
For information related to this and other published CERT Advisories that may relate to the IBM eServer Platforms (xSeries, iSeries, pSeries, and zSeries) please go to https://app-06.www.ibm.com/servers/resourcelink/lib03020.nsf/pages/security=alerts?OpenDocument&pathID=
In order to access this information you will require a Resource Link ID. To subscribe to Resource Link go to <http://app-06.www.ibm.com/servers/resourcelink> and follow the steps for registration.
All questions should be reffered to [email protected].
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).
Notified: October 09, 2003 Updated: November 05, 2003
Affected
`Vulnerable Supported Versions
UnixWare 7.1.3
Open UNIX 8.0.0 (a.k.a UnixWare 7.1.2)
UnixWare 7.1.1
`
`Location of Fixed Binaries
<ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.31>
SCO security resources can be found at
<http://www.sco.com/support/security/index.html>``
`
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).
Notified: October 09, 2003 Updated: November 10, 2003
Affected
Common Desktop Environment (CDE) distributed with Solaris Operating Environment is vulnerable. For more details please refer to Sun Alert 57414 available at: ``<http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57414>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).
Notified: October 09, 2003 Updated: November 04, 2003
Affected
Xi Graphics deXtop CDE 3.0 is vulnerable. An update will be made available on our ftp site on Monday Nov 3. The location of the update will be:
<ftp://ftp.xig.com/pub/updates/dextop/3.0/DEX3000.003.tar.gz>
<ftp://ftp.xig.com/pub/updates/dextop/3.0/DEX3000.003.txt>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).
Notified: October 09, 2003 Updated: November 04, 2003
Not Affected
The AIX Operating System is not vulnerable to the issues discussed in CERT Vulnerability Note VU#575804.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).
Notified: October 09, 2003 Updated: October 16, 2003
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).
Notified: October 09, 2003 Updated: October 16, 2003
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).
Notified: October 09, 2003 Updated: October 16, 2003
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).
Notified: October 09, 2003 Updated: October 16, 2003
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23575804 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Kevin Kotas of Computer Associates eTrust Vulnerability Manager. Thanks also to XiGraphics and SCO for information used in this document.
This document was written by Robert C. Seacord and Art Manion.
CVE IDs: | CVE-2003-0834 |
---|---|
Severity Metric: | 2.81 Date Public: |