CVE-2003-1021

The scosession program in OpenServer 5.0.6 and 5.0.7 allows local users to gain privileges via crafted strings on the commandline.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.1:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.3:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.6a:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*

History

20 Nov 2024, 23:46

Type Values Removed Values Added
References () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.5/SCOSA-2005.5.txt - () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.5/SCOSA-2005.5.txt -
References () http://secunia.com/advisories/14012/ - Patch, Vendor Advisory () http://secunia.com/advisories/14012/ - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/972598 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/972598 - Patch, Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/12372 - Vendor Advisory () http://www.securityfocus.com/bid/12372 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19479 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/19479 -

Information

Published : 2005-01-26 05:00

Updated : 2024-11-20 23:46


NVD link : CVE-2003-1021

Mitre link : CVE-2003-1021

CVE.ORG link : CVE-2003-1021


JSON object : View

Products Affected

sco

  • openserver