Vulnerability Description
SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sco | Open Unix | 8.0 |
| Sco | Unixware | 7.1.1 |
References
- ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.32/CSSA-2003-SCO.32.txtPatchVendor Advisory
- http://marc.info/?l=bugtraq&m=106865297403687&w=2
- http://www.texonet.com/advisories/TEXONET-20031024.txtPatchVendor AdvisoryURL Repurposed
- ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.32/CSSA-2003-SCO.32.txtPatchVendor Advisory
- http://marc.info/?l=bugtraq&m=106865297403687&w=2
- http://www.texonet.com/advisories/TEXONET-20031024.txtPatchVendor AdvisoryURL Repurposed
FAQ
What is CVE-2003-0937?
CVE-2003-0937 is a vulnerability with a CVSS score of 4.6 (MEDIUM). SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and ca...
How severe is CVE-2003-0937?
CVE-2003-0937 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-0937?
Check the references section above for vendor advisories and patch information. Affected products include: Sco Open Unix, Sco Unixware.