CVE-2003-0937

SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:sco:open_unix:8.0:*:*:*:*:*:*:*
cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*
cpe:2.3:o:sco:unixware:7.1.3:*:*:*:*:*:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://www.texonet.com/advisories/TEXONET-20031024.txt - Patch, Vendor Advisory () http://www.texonet.com/advisories/TEXONET-20031024.txt - Patch, Vendor Advisory, URL Repurposed

Information

Published : 2003-12-15 05:00

Updated : 2024-02-14 01:17


NVD link : CVE-2003-0937

Mitre link : CVE-2003-0937

CVE.ORG link : CVE-2003-0937


JSON object : View

Products Affected

sco

  • unixware
  • open_unix