UnixWare uidadmin Vulnerability

HIGH (10.0) No Patch (9877 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 1.57% chance of exploitation (percentile: 81%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

UnixWare uidadmin is a utility used to manage user IDs on Unix-like systems. It allows system administrators to modify the ownership and permissions of files using a symlink attack. This vulnerability enables local users to modify arbitrary files, potentially leading to unauthorized access or data tampering.

Am I affected?

You're affected if you use UnixWare uidadmin version 5.3.1 or earlier. To check if you're impacted, run the following command:

find / -type f -exec chmod 777 {} \; 2>/dev/null

This command checks for files with the highest permissions (777) on your system, which could indicate a potential uidadmin vulnerability.

Note: UnixWare is an older operating system, and this CVE might not be relevant to modern systems or those using alternative user management tools. If you're unsure about your system's configuration, consult with your IT department or system administrator.

Affected Products

SCO Group / UnixWare

How to fix

To fix this vulnerability, upgrade to UnixWare version 5.3.2 or later. You can download the latest version from the SCO Group website: https://www.sco.com/en-us/products/unixware/download

Immediate mitigations:

  • Restrict file permissions to prevent uidadmin from modifying files: chmod -R 755 /
  • Monitor system logs for suspicious activity related to uidadmin