CVE-2004-1942
CVSS7.5
发布时间 :2004-04-19 00:00:00
修订时间 :2016-10-17 23:03:27
NMCO    

[原文]The Solaris 9 patches 113579-02 through 113579-05, and 114342-02 through 114342-05, prevent ypserv and ypxfrd from properly restricting access to secure NIS maps, which allows local users to use ypcat or ypmatch to extract the contents of a secure map such as passwd.adjunct.byname.


[CNNVD]Sun Solaris Patch信息泄露漏洞(CNNVD-200404-069)

        
        Solaris是一款由Sun Microsystems公司开发和维护的商业性质UNIX操作系统。
        Solaris部分补丁的发布包含问题,远程和本地攻击者可以利用这个漏洞获得敏感信息。
        允许NIS服务,包含安全映射(secure maps)和补丁patches 113579-02到113579-05 (for SPARC)或114342-02到114342-05 (for x86)的Solaris 9系统,允许本地或远程非特权用户访问安全映射信息,如"passwd.adjunct.byname"。
        <*链接:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57554
        *>

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:sun:patch_manager:113579-05
cpe:/a:sun:patch_manager:113579-02
cpe:/a:sun:patch_manager:114342-05
cpe:/a:sun:patch_manager:114342-04
cpe:/a:sun:patch_manager:114342-03
cpe:/a:sun:patch_manager:114342-02
cpe:/a:sun:patch_manager:113579-03
cpe:/a:sun:patch_manager:113579-04

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1942
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1942
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200404-069
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=108241638500417&w=2
(UNKNOWN)  BUGTRAQ  20040419 Solaris 9 patch 113579-03 introduces a NIS security bug
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57554-1
(VENDOR_ADVISORY)  SUNALERT  57554
http://www.ciac.org/ciac/bulletins/o-144.shtml
(VENDOR_ADVISORY)  CIAC  O-144
http://www.securityfocus.com/bid/10261
(VENDOR_ADVISORY)  BID  10261
http://xforce.iss.net/xforce/xfdb/15908
(VENDOR_ADVISORY)  XF  solaris-nis-unauth-privileges(15908)

- 漏洞信息

Sun Solaris Patch信息泄露漏洞
高危 设计错误
2004-04-19 00:00:00 2005-10-20 00:00:00
远程※本地  
        
        Solaris是一款由Sun Microsystems公司开发和维护的商业性质UNIX操作系统。
        Solaris部分补丁的发布包含问题,远程和本地攻击者可以利用这个漏洞获得敏感信息。
        允许NIS服务,包含安全映射(secure maps)和补丁patches 113579-02到113579-05 (for SPARC)或114342-02到114342-05 (for x86)的Solaris 9系统,允许本地或远程非特权用户访问安全映射信息,如"passwd.adjunct.byname"。
        <*链接:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57554
        *>

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 删除这些补丁。
        厂商补丁:
        Sun
        ---
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Sun Patch 113579-02 :
        Sun Patch T113579-06
        
        http://sunsolve.sun.com/tpatches

        Sun Patch 113579-03 :
        Sun Patch T113579-06
        
        http://sunsolve.sun.com/tpatches

        Sun Patch 113579-04 :
        Sun Patch T113579-06
        
        http://sunsolve.sun.com/tpatches

        Sun Patch 113579-05 :
        Sun Patch T113579-06
        
        http://sunsolve.sun.com/tpatches

        Sun Patch 114342-02 :
        Sun Patch T114342-06
        
        http://sunsolve.sun.com/tpatches

        Sun Patch 114342-03 :
        Sun Patch T114342-06
        
        http://sunsolve.sun.com/tpatches

        Sun Patch 114342-04 :
        Sun Patch T114342-06
        
        http://sunsolve.sun.com/tpatches

        Sun Patch 114342-05 :
        Sun Patch T114342-06
        
        http://sunsolve.sun.com/tpatches

- 漏洞信息

5602
Solaris 9 Secure NIS Map Exposure
Local Access Required, Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Unknown

- 漏洞描述

Solaris contains a flaw that may lead to an unauthorized information disclosure. The bug causes secure NIS maps not to be treated as secure any longer. Any user on a NIS client may extract the contents of a secure map such as "passwd.adjunct.byname" by using the ypcat and ypmatch functions. This information can be used to gain additional privileges on the system.

- 时间线

2004-04-19 2004-03-29
Unknow Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Remove patch 113579-03 with patchrm(1m) and then restart the NIS daemons.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站