Sun Ray Smartcard reader may leave desktop session open when card is quickly removed

ID VU:100780
Type cert
Reporter CERT
Modified 2012-03-14T00:00:00



The Sun Ray Smartcard reader fails to properly detect a "quick removal, reinsertion and removal of a Smartcard."


The Sun Ray is a thin client computing device designed to process user input and output, and provide access to computing services hosted by a server. Authentication can be accomplished through a smartcard. By design, the smartcard must remain inserted during the user's session. Quoting from sun documentation about smart cards and the Sun Ray:

When the user is finished (that is, the smart card is removed), the Authentication Manager is notified. If the user has not logged out, the session is kept alive with all services disconnected from the display. No files are left on the device, as all state is kept on the server, and the screen is cleared. When the user removes the smart card, there are no traces that he or she had been there. There is no risk that the next user to walk up will discover files or see the contents of windows that he or she shouldn't see.
A "quick removal, reinsertion and removal of a Smartcard" into the smartcard reader is not detected properly under some circumstances. If this occurs, the login session remains connected to the Desk Top Unit (DTU) inappropriately.


Under some circumstances, a user session may remain available even if the smartcard has been removed, in violation of the security architecture of the system.


A fix is pending from the vendor.

Until a fix is available, ensure that all sessions have been disconnected when removing a smartcard from the Sun Ray Smartcard reader.

Systems Affected

Vendor| Status| Date Notified| Date Updated
Sun Microsystems, Inc.| | -| 04 Jun 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A



Thanks to Sun Microsystems for reporting this vulnerability.

This document was written by Shawn V Hernan.

Other Information

  • CVE IDs: Unknown
  • Date Public: 28 Apr 2003
  • Date First Published: 04 Jun 2003
  • Date Last Updated: 14 Mar 2012
  • Severity Metric: 0.13
  • Document Revision: 9