There is a vulnerability in the Common Desktop Environment (CDE) for UNIX systems which can allow a local user to gain root privileges.
The Common Desktop Environment (CDE) is a standard desktop environment for UNIX based systems. CDE libDtHelp contains a buffer overflow that can be exploited by a local user. By modifying the DTHELPUSERSEARCHPATH or DTHELPSEARCHPATH environment variables and invoking Help an attacker can gain elevated privileges. For example, since dtprintinfo is commonly setuid root, it may be exploited by a local user to gain root privileges. Other programs that run with elevated privileges and link libDtHelp are also potential attack vectors.
An authenticated local user may be able to execute arbitrary code with root privileges. The attacker may also be able to crash vulnerable programs causing a denial of service.
Apply Patch or Upgrade
Apply a patch or upgrade as advised by your vendor. See the Systems Affected section for more information.
Thanks to Kevin Kotas of Computer Associates eTrust Vulnerability Manager. Thanks also to XiGraphics and SCO for information used in this document.
This document was written by Robert C. Seacord and Art Manion.
|Date First Published:||2003-11-04|
|Date Last Updated:||2004-08-26 21:38 UTC|