CVE-1999-0134
CVSS7.2
发布时间 :1996-08-06 00:00:00
修订时间 :2008-09-09 08:33:49
NMCO    

[原文]vold in Solaris 2.x allows local users to gain root access.


[CNNVD]Solaris权限许可和访问控制漏洞(CNNVD-199608-003)

        Solaris 2.x的vold存在漏洞,本地用户可以借助此漏洞访问根目录。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:sun:sunos:5.5::x86
cpe:/o:sun:sunos:5.4::x86
cpe:/o:sun:sunos:5.4Sun Microsystems Solaris 2.4
cpe:/o:sun:sunos:5.5.1Sun Microsystems Solaris 2.5.1
cpe:/o:sun:sunos:5.5Sun Microsystems Solaris 2.5
cpe:/o:sun:sunos:5.5.1::x86

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0134
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0134
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199608-003
(官方数据源) CNNVD

- 其它链接及资源

http://www.osvdb.org/8159
(UNKNOWN)  OSVDB  8159

- 漏洞信息

Solaris权限许可和访问控制漏洞
高危 未知
1996-08-06 00:00:00 2005-05-02 00:00:00
本地  
        Solaris 2.x的vold存在漏洞,本地用户可以借助此漏洞访问根目录。

- 公告与补丁

        

- 漏洞信息

8159
Solaris vold Insecure Temporary File Creation
Local Access Required Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

Solaris vold(1M) daemon contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when removable media devices are installed/configured and the program creates temporary files. It's possible to cause vold to create or overwrite arbitrary commands on the file system, leading to a loss of integrity.

- 时间线

1996-07-06 1996-07-02
Unknow Unknow

- 解决方案

Upgrade to Solaris version 2.6 or higher, as it has been reported to fix this vulnerability. Sun Microsystems. Inc have released the following suite of patches to address this vulnerability: Solaris 2.4: 101907-14 Solaris 2.4_x86: 101908-14 Solaris 2.5: 104015-01 Solaris 2.5_x86: 104016-01 Solaris 2.5.1: 104010-01 Solaris 2.5.1_x86: 104011-01 Sites that do not require the vold functionality should remove the complete set of Volume Management packages. These are SUNWvolg, SUNWvolu and SUNWvolr. These packages can be removed using pkgrm(1M). Alternatively, to prevent rmmount(1M) creating temporary files, sites must edit the /etc/rmmount.conf file and comment out (or remove) any entry which references action_filemgr.so. The standard /etc/rmmount.conf contains the following entries which must be commented out (or deleted) to remove this vulnerability: action cdrom action_filemgr.so action floppy action_filemgr.so After applying this workaround, an example of /etc/rmmount.conf may look like: # @(#)rmmount.conf 1.2 92/09/23 SMI # # Removable Media Mounter configuration file. # # File system identification ident hsfs ident_hsfs.so cdrom ident ufs ident_ufs.so cdrom floppy pcmem ident pcfs ident_pcfs.so floppy pcmem # Actions # # Following two lines commented out to remove vold vulnerability # # action cdrom action_filemgr.so # action floppy action_filemgr.so Note that vold does not have to be restarted for these changes to take effect.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站