Security hole in sccw

    Date08 Dec 1999
    CategorySuSE
    2822
    Posted ByLinuxSecurity Advisories
    The /usr/bin/sccw tool can be used to read any file on the system.
    ______________________________________________________________________________
    
                            SuSE Security Announcement
    
            Package:  sccw-1.1 and earlier
            Date:     Mon Sep 20 23:40:09 CEST 1999
            Affected: all Linux distributions using sccw
    _____________________________________________________________________________
    
    A security hole was discovered in the package mentioned above.
    Please update as soon as possible or disable the service if you are using
    this software on your SuSE Linux installation(s).
    
    Other Linux distributions or operating systems might be affected as
    well, please contact your vendor for information about this issue.
    
    Please note, that that we provide this information on as "as-is" basis only.
    There is no warranty whatsoever and no liability for any direct, indirect or
    incidental damage arising from this information or the installation of
    the update package.
    _____________________________________________________________________________
    
    1. Problem Description
    
      The /usr/bin/sccw tool can be used to read any file on the system.
    
    2. Impact
    
      An attacker can read e.g the /etc/shadow file or private email.
    
    3. Solution
    
      Updated the sccw package from our FTP server.
    ______________________________________________________________________________
    
    Here are the md5 checksums of the upgrade packages, please verify these
    before installing the new packages:
    
      f70f788861bf0ee402405a7dc14431a  sccw-1.1-32.i386.rpm (6.2)
    
    ______________________________________________________________________________
    
    You will find the update on our ftp-Server:
    
      ftp://ftp.suse.com/pub/suse/i386/update/6.2/ham1/sccw-1.1-32.i386.rpm
    
    Webpage for patches:
      http://www.suse.de/patches/index.html
    
    or try the following web pages for a list of mirrors:
      http://www.suse.de/ftp.html
      http://www.suse.com/ftp_new.html
    
    ______________________________________________________________________________
    
    SuSE has got two free security mailing list services to which any
    interested party may subscribe:
    
    This email address is being protected from spambots. You need JavaScript enabled to view it.          - moderated and for general/linux/SuSE
                                      security discussions. All SuSE security
                                      announcements are send to this list.
    
    This email address is being protected from spambots. You need JavaScript enabled to view it. - SuSE's announce-only mailing list.
                                      Only SuSE's security annoucements are sent
                                      to this list.
    
    To subscribe, just send an emtpy message to This email address is being protected from spambots. You need JavaScript enabled to view it.
    or This email address is being protected from spambots. You need JavaScript enabled to view it. like this:
    
            echo | mail This email address is being protected from spambots. You need JavaScript enabled to view it.
    or
            echo | mail This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    ______________________________________________________________________________
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":53.49,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.63,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":34.88,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.