<date>
04/2001

<title>
kernel setcontext()

<os>
SCO OpenServer 5.0.4 5.0.6 x86

<info>
the code forces operating system kernel to perform unauthorized context
switch and transfer control to user procedure on processor 0 protection
level. it is done through setcontext(ucontext_t *) system call.

as a result command shell is spawned with effective root user privilege.

<link>
SCO/osx86_setcontext.c

<file>
SCO/osx86_setcontext.c

