SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sco unixware 7.1.3 |
||
sco unixware 7.1.1 |
||
sco open unix 8.0 |