How to Buy
This script is Copyright (C) 2003-2016 Tenable Network Security, Inc.
The remote server is affected by multiple local privilege escalation
According to its telnet banner, the remote host is a SCO Unix server
running OpenServer version 5.0.5, 5.0.6, or 5.0.7. Such versions are
vulnerable to two distinct exploits. Namely,
- Xsco can be locally exploited by any valid user in
order to escalate their privileges to 'root'. The bug
is due to improper input handling when running the
command line switch '-co'.
- There is a vulnerability in the MIT-SHM extension within
all X servers that are running as root. Any user with
local X access can exploit the MIT-SHM extension and
gain read/write access to any shared memory segment on
See also :
Install the patched binaries referenced in the vendor's advisory.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.3
Public Exploit Available : false
Nessus Plugin ID: 11895 ()
Bugtraq ID: 43964985
CVE ID: CVE-2002-0158CVE-2002-0164
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.