SCO Security Advisory SCOSA-2006.23 - UnixWare 7.1.4 : GhostScript Insecure Temporary File Creation Vulnerability.
186509323f9b90527c1c74b30aaadd04b978ad623d7a6e08f6aa49aaf54833c9
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SCO Security Advisory
Subject: UnixWare 7.1.4 : GhostScript Insecure Temporary File Creation Vulnerability
Advisory number: SCOSA-2006.23
Issue date: 2006 May 09
Cross reference: fz533156
CVE-2004-0967
______________________________________________________________________________
1. Problem Description
Ghostscript is affected by an insecure temporary file creation
vulnerability. This issue is likely due to a design error
that causes the application to fail to verify the existence
of a file before writing to it.
An attacker may leverage this issue to overwrite arbitrary
files with the privileges of an unsuspecting user that
activates the vulnerable application. Reportedly this issue
is unlikely to facilitate privilege escalation.
The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2004-0967 to
this issue.
2. Vulnerable Supported Versions
System Binaries
----------------------------------------------------------------------
UnixWare 7.1.4 Ghostscript package
3. Solution
The proper solution is to install the latest packages.
4. UnixWare 7.1.4
4.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.23
4.2 Verification
MD5 (p533156.714.image) = 64ad569588eff4ac2c8a3a1e07151847
md5 is available for download from
ftp://ftp.sco.com/pub/security/tools
4.3 Installing Fixed Binaries
The following packages should be installed on your system before
you install this fix:
UnixWare 7.1.4 Maintenance Pack 3
https://www.sco.com/support/update/download/release.php?rid=126
ptf9052
https://www.sco.com/support/update/download/release.php?rid=160
Upgrade the affected binaries with the following sequence:
Download p533156.714.image to the /var/spool/pkg directory
# pkgadd -d /var/spool/pkg/p533156.714.image
5. References
Specific references for this advisory:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0967
https://www.securityfocus.com/bid/11285
https://secunia.com/advisories/12903/
https://secunia.com/advisories/17135
https://www.cs.wisc.edu/~ghost/
SCO security resources:
https://www.sco.com/support/security/index.html
SCO security advisories via email
https://www.sco.com/support/forums/security.html
This security fix closes SCO incidents fz533156.
6. Disclaimer
SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended
to promote secure installation and use of SCO products.
7. Acknowledgments
Trustix security engineers are credited with the discovery of
this vulnerability.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (SCO_SV)
iD8DBQFEYOQUaqoBO7ipriERAjSPAJ4xJjBCN8bDayXAn7PuJ11tIAPh7QCfWIgB
OWvfq82zzyeLc5iS/x1iew8=
=DmgU
-----END PGP SIGNATURE-----