SCO Unixware 7 scohelp Search CGI Format String Vulnerability
SCO Unixware 7 default installation includes scohelp, an http server that listens on port 457/tcp and allows access to manual pages and other documentation files. The search CGI script provided for that purpose has a vulnerability that could allow any remote attacker to execute arbitrary code on the vulnerable machine with privileges of user 'nobody'. This can be done by sending a request with the following URI: http://target:457/search97cgi/vtopic?Action= FilterSearch&filter=&queryText=%25x. This will elicit an Internal error response from the server, which shows that the server is interpreting the %x argument passed in the URI as the 'queryText' value. By supplying a carefully built value for the queryText argument, an attacker can change the program flow and execute arbitrary code.