[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] SCOSA-2005.50 OpenServer 6.0.0 : Telnet Environment Leakage
- To: security-announce@xxxxxxxxxxxx
- Subject: [Full-disclosure] SCOSA-2005.50 OpenServer 6.0.0 : Telnet Environment Leakage
- From: security@xxxxxxx
- Date: Thu, 17 Nov 2005 12:31:09 -0500 (EST)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SCO Security Advisory
Subject: OpenServer 6.0.0 : Telnet Environment Leakage
Advisory number: SCOSA-2005.50
Issue date: 2005 November 17
Cross reference: sr895063 fz533032 erg712953
CVE-2005-0488
______________________________________________________________________________
1. Problem Description
Certain BSD-based telnet clients allow remote malicious telnet
servers to read sensitive environment variables via the
NEW-ENVIRON option with a SEND ENV_USERVAR command.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2005-0488 to this issue.
2. Vulnerable Supported Versions
System Binaries
----------------------------------------------------------------------
OpenServer 6.0.0 /usr/bin/telnet
3. Solution
The proper solution is to install the latest packages.
4. OpenServer 6.0.0
4.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.50
4.2 Verification
MD5 (VOL.000.000) = 46b46ad83b21d7e775d58fa80f15f584
md5 is available for download from
ftp://ftp.sco.com/pub/security/tools
4.3 Installing Fixed Binaries
Upgrade the affected binaries with the following sequence:
1) Download the VOL* files to a directory.
2) Run the custom command, specify an install
from media images, and specify the directory as
the location of the images.
5. References
Specific references for this advisory:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0488
http://idefense.com/application/poi/display?id=260&type=vulnerabilities
SCO security resources:
http://www.sco.com/support/security/index.html
SCO security advisories via email
http://www.sco.com/support/forums/security.html
This security fix closes SCO incidents sr895063 fz533032
erg712953.
6. Disclaimer
SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers
intended to promote secure installation and use of SCO
products.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (UnixWare)
iD8DBQFDfLtsaqoBO7ipriERAkVJAJ4rJ14TznUpP7y/WkeKY86burV5gQCgqPV5
DSp7y7OYfQguGhwGvc83x10=
=BdpS
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/