Solaris vold(1M) daemon contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when removable media devices are installed/configured and the program creates temporary files. It's possible to cause vold to create or overwrite arbitrary commands on the file system, leading to a loss of integrity.
Upgrade to Solaris version 2.6 or higher, as it has been reported to fix this vulnerability.
Sun Microsystems. Inc have released the following suite of patches to address this vulnerability:
Solaris 2.4: 101907-14
Solaris 2.4_x86: 101908-14
Solaris 2.5: 104015-01
Solaris 2.5_x86: 104016-01
Solaris 2.5.1: 104010-01
Solaris 2.5.1_x86: 104011-01
Sites that do not require the vold functionality should remove the complete set of Volume Management packages. These are SUNWvolg, SUNWvolu and SUNWvolr.
These packages can be removed using pkgrm(1M).
Alternatively, to prevent rmmount(1M) creating temporary files, sites must edit the /etc/rmmount.conf file and comment out (or remove) any entry which references action_filemgr.so.
The standard /etc/rmmount.conf contains the following entries which must be commented out (or deleted) to remove this vulnerability:
action cdrom action_filemgr.so
action floppy action_filemgr.so
After applying this workaround, an example of /etc/rmmount.conf may look like:
# @(#)rmmount.conf 1.2 92/09/23 SMI
# Removable Media Mounter configuration file.
# File system identification
ident hsfs ident_hsfs.so cdrom
ident ufs ident_ufs.so cdrom floppy pcmem
ident pcfs ident_pcfs.so floppy pcmem
# Following two lines commented out to remove vold vulnerability
# action cdrom action_filemgr.so
# action floppy action_filemgr.so
Note that vold does not have to be restarted for these changes to take effect.