search menu icon-carat-right cmu-wordmark

CERT Coordination Center

CDE libDtHelp vulnerable to buffer overflow via DTHELPUSERSEARCHPATH or DTHELPSEARCHPATH

Vulnerability Note VU#575804

Original Release Date: 2003-11-04 | Last Revised: 2004-08-26

Overview

There is a vulnerability in the Common Desktop Environment (CDE) for UNIX systems which can allow a local user to gain root privileges.

Description

The Common Desktop Environment (CDE) is a standard desktop environment for UNIX based systems. CDE libDtHelp contains a buffer overflow that can be exploited by a local user. By modifying the DTHELPUSERSEARCHPATH or DTHELPSEARCHPATH environment variables and invoking Help an attacker can gain elevated privileges. For example, since dtprintinfo is commonly setuid root, it may be exploited by a local user to gain root privileges. Other programs that run with elevated privileges and link libDtHelp are also potential attack vectors.

Impact

An authenticated local user may be able to execute arbitrary code with root privileges. The attacker may also be able to crash vulnerable programs causing a denial of service.

Solution

Apply Patch or Upgrade

Apply a patch or upgrade as advised by your vendor. See the Systems Affected section for more information.

Vendor Information

575804
 
Affected   Unknown   Unaffected

Hewlett-Packard Company

Notified:  October 09, 2003 Updated:  December 03, 2003

Status

  Vulnerable

Vendor Statement

==============================================
Hewlett-Packard Company

SOURCE:  Hewlett-Packard Company
Software Security Response Team (SSRT)


Date:  November 4, 2003
CROSS REFERENCE ID:  SSRT3657


Hewlett Packard is currently investigating the potential
impact to HP released operating system software.


HP will provide notice of the availability of any necessary
patches through standard security bulletin announcements and
be available from your normal HP Services support channel.



To report any security issue for any HP software
products send email to  security-alert@hp.com

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see HPSBUX0311-297 / SSRT3657 for more information.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

IBM eServer

Notified:  October 09, 2003 Updated:  November 04, 2003

Status

  Vulnerable

Vendor Statement

IBM eServer Platform Response

For information related to this and other published CERT Advisories that may relate to the IBM eServer Platforms (xSeries, iSeries, pSeries, and zSeries) please go to https://app-06.www.ibm.com/servers/resourcelink/lib03020.nsf/pages/security=alerts?OpenDocument&pathID=

In order to access this information you will require a Resource Link ID. To subscribe to Resource Link go to http://app-06.www.ibm.com/servers/resourcelink and follow the steps for registration.

All questions should be reffered to servsec@us.ibm.com.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

SCO

Notified:  October 09, 2003 Updated:  November 05, 2003

Status

  Vulnerable

Vendor Statement

Vulnerable Supported Versions
- -----------------------------
UnixWare 7.1.3
Open UNIX 8.0.0 (a.k.a UnixWare 7.1.2)
UnixWare 7.1.1

Location of Fixed Binaries
- --------------------------
ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.31

SCO security resources can be found at

http://www.sco.com/support/security/index.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Sun Microsystems Inc.

Notified:  October 09, 2003 Updated:  November 10, 2003

Status

  Vulnerable

Vendor Statement

Common Desktop Environment (CDE) distributed with Solaris Operating
Environment is vulnerable. For more details please refer to Sun Alert
57414 available at:
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57414

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Xi Graphics

Notified:  October 09, 2003 Updated:  November 04, 2003

Status

  Vulnerable

Vendor Statement

Xi Graphics deXtop CDE 3.0 is vulnerable. An update will be made available on our ftp site on Monday Nov 3. The location of the update will be:

ftp://ftp.xig.com/pub/updates/dextop/3.0/DEX3000.003.tar.gz
ftp://ftp.xig.com/pub/updates/dextop/3.0/DEX3000.003.txt

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

IBM

Notified:  October 09, 2003 Updated:  November 04, 2003

Status

  Not Vulnerable

Vendor Statement

The AIX Operating System is not vulnerable to the issues discussed in CERT Vulnerability Note VU#575804.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Cray Inc.

Notified:  October 09, 2003 Updated:  October 16, 2003

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Data General

Notified:  October 09, 2003 Updated:  October 16, 2003

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Open Group

Notified:  October 09, 2003 Updated:  October 16, 2003

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

SGI

Notified:  October 09, 2003 Updated:  October 16, 2003

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

Thanks to Kevin Kotas of Computer Associates eTrust Vulnerability Manager. Thanks also to XiGraphics and SCO for information used in this document.

This document was written by Robert C. Seacord and Art Manion.

Other Information

CVE IDs: CVE-2003-0834
Severity Metric: 2.81
Date Public: 2003-11-04
Date First Published: 2003-11-04
Date Last Updated: 2004-08-26 21:38 UTC
Document Revision: 23

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.