Vulnerability Name:

CVE-1999-1185 (CCN-1379)

Assigned:1998-09-26
Published:1998-09-26
Updated:2017-07-11
Summary:Buffer overflow in SCO mscreen allows local users to gain root privileges via a long terminal entry (TERM) in the .mscreenrc file.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Thu, 27 Aug 1998 14:08:48 -0400
SCO mscreen vul.

Source: CCN
Type: BugTraq Mailing List, Sat, 26 Sep 1998 12:20:04 +0400
Root exploit for SCO OpenServer.

Source: MITRE
Type: CNA
CVE-1999-1041

Source: MITRE
Type: CNA
CVE-1999-1185

Source: CCN
Type: CERT Vendor-Initiated Bulletin VB-98.10
Security Vulnerabilities in "mscreen" Serial Multiscreens Utility

Source: BUGTRAQ
Type: UNKNOWN
19980926 Root exploit for SCO OpenServer.

Source: CCN
Type: OSVDB ID: 8791
SCO UNIX / OpenServer mscreen Multiple Vector Local Overflow

Source: CCN
Type: SCO Security Web site
Security Fixes

Source: XF
Type: UNKNOWN
sco-openserver-mscreen-bo(1379)

Source: XF
Type: UNKNOWN
sco-openserver-mscreen-bo(1379)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sco:cmw:3.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:sco:internet_faststart:all_versions:*:*:*:*:*:*:*
  • OR cpe:/o:sco:open_desktop:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:sco:openserver:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:sco:openserver:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:sco:openserver_enterprise_system:5.0.4p:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:sco:openserver_enterprise_system:5.0.4p:*:*:*:*:*:*:*
  • OR cpe:/o:sco:openserver:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:sco:internet_faststart:*:*:*:*:*:*:*:*
  • OR cpe:/a:sco:cmw:3.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sco cmw 3.0
    sco internet faststart all_versions
    sco open desktop 3.0
    sco openserver 3.0
    sco openserver 5.0
    sco openserver enterprise system 5.0.4p
    sco openserver enterprise system 5.0.4p
    sco openserver 5.0
    sco internet faststart *
    sco cmw 3.0