S-075: Vulnerability in Macrovision Driver


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-075: Vulnerability in Macrovision Driver
# 1  
Old 12-24-2007
S-075: Vulnerability in Macrovision Driver

A local elevation of privilege vulnerability exists in the way that the Macrovision driver incorrectly handles configuration parameters. The risk is MEDIUM. Local elevation of privilege.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. Hardware

Difference between platform driver,codec driver and Machine driver

In general terms what are the differences platform driver,codec driver and Machine driver? (1 Reply)
Discussion started by: rupeshkp728
1 Replies

2. UNIX for Dummies Questions & Answers

boot option Available partitions 0b00 1048575 sr0 driver:sr 0800 488386584 sda driver:sd

Help, suspect hacked via serial or electric! any ideas on error "Pid:1, comm:swapper Tainted:G W 2.6.35-22 generic #33 -unbutu device = "(null)" or unknown-blocklist(8.1) please append a correct "root"boot option Available partitions 0b00 1048575 sr0 driver:sr 0800 488386584 sda driver:sd. Thanks... (3 Replies)
Discussion started by: kryclear
3 Replies

3. Solaris

SUNWglmr -- rasctrl environment monitoring driver for i2c or SCSI device driver ?

I've been researching minimizeing Solaris 8 and found that on the web page http://www.sun.com/bigadmin/content/packagelist/s8u7PkgList/p2.html the package SUNWglmr is listed as "rasctrl environment monitoring driver for i2c, (Root) (32-bit)" while in the document "Solaris 8 minimize-updt1.pdf"... (1 Reply)
Discussion started by: roygoodwin
1 Replies

4. Post Here to Contact Site Administrators and Moderators

To Driver

Driver, Are you an admin? I got banned from the board two times! Is this authorized? (13 Replies)
Discussion started by: Computekwes
13 Replies
Login or Register to Ask a Question
privileged(9r)															    privileged(9r)

NAME
privileged - General: Checks for proper privileges SYNOPSIS
int privileged( int privilege, int error_code ); ARGUMENTS
Specifies the privilege to check against. This privilege must be one of the constants defined in /usr/sys/include/sys/security.h. For exam- ple, you would specify SEC_FILESYS for disk drivers that must manipulate partition tables on disk drives. Specifies the value used to con- trol auditing. You can pass one of the system's error codes or one of the following values: -1, 0, 1. An example of an error code is the constant EPERM. DESCRIPTION
The privileged routine checks for an appropriate privilege when the security feature is enabled. Use privileged with a privilege number and with the error_code argument set to the constant EPERM to emulate the traditional behavior of the suser routine. Set error_code to a value of 0 (zero) if you want to check the privilege but not fail the operation if the user does not have the proper privilege. A value of -1 turns off all auditing as well. RETURN VALUES
The privileged routine returns the value 0 (zero) if the process does not have privilege. It returns the value 1 if the process does have privilege. FILES
SEE ALSO
Routines: suser(9r) privileged(9r)