发布时间 :1996-08-06 00:00:00
修订时间 :2008-09-09 08:33:49

[原文]vold in Solaris 2.x allows local users to gain root access.


        Solaris 2.x的vold存在漏洞,本地用户可以借助此漏洞访问根目录。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:sun:sunos:5.4Sun Microsystems Solaris 2.4
cpe:/o:sun:sunos:5.5.1Sun Microsystems Solaris 2.5.1
cpe:/o:sun:sunos:5.5Sun Microsystems Solaris 2.5

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

高危 未知
1996-08-06 00:00:00 2005-05-02 00:00:00
        Solaris 2.x的vold存在漏洞,本地用户可以借助此漏洞访问根目录。

- 公告与补丁


- 漏洞信息

Solaris vold Insecure Temporary File Creation
Local Access Required Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

Solaris vold(1M) daemon contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when removable media devices are installed/configured and the program creates temporary files. It's possible to cause vold to create or overwrite arbitrary commands on the file system, leading to a loss of integrity.

- 时间线

1996-07-06 1996-07-02
Unknow Unknow

- 解决方案

Upgrade to Solaris version 2.6 or higher, as it has been reported to fix this vulnerability. Sun Microsystems. Inc have released the following suite of patches to address this vulnerability: Solaris 2.4: 101907-14 Solaris 2.4_x86: 101908-14 Solaris 2.5: 104015-01 Solaris 2.5_x86: 104016-01 Solaris 2.5.1: 104010-01 Solaris 2.5.1_x86: 104011-01 Sites that do not require the vold functionality should remove the complete set of Volume Management packages. These are SUNWvolg, SUNWvolu and SUNWvolr. These packages can be removed using pkgrm(1M). Alternatively, to prevent rmmount(1M) creating temporary files, sites must edit the /etc/rmmount.conf file and comment out (or remove) any entry which references The standard /etc/rmmount.conf contains the following entries which must be commented out (or deleted) to remove this vulnerability: action cdrom action floppy After applying this workaround, an example of /etc/rmmount.conf may look like: # @(#)rmmount.conf 1.2 92/09/23 SMI # # Removable Media Mounter configuration file. # # File system identification ident hsfs cdrom ident ufs cdrom floppy pcmem ident pcfs floppy pcmem # Actions # # Following two lines commented out to remove vold vulnerability # # action cdrom # action floppy Note that vold does not have to be restarted for these changes to take effect.

- 相关参考

- 漏洞作者

Unknown or Incomplete