Solaris vold Insecure Temporary File Creation

1996-07-06T00:00:00
ID OSVDB:8159
Type osvdb
Reporter OSVDB
Modified 1996-07-06T00:00:00

Description

Vulnerability Description

Solaris vold(1M) daemon contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when removable media devices are installed/configured and the program creates temporary files. It's possible to cause vold to create or overwrite arbitrary commands on the file system, leading to a loss of integrity.

Solution Description

Upgrade to Solaris version 2.6 or higher, as it has been reported to fix this vulnerability.

Sun Microsystems. Inc have released the following suite of patches to address this vulnerability:

Solaris 2.4: 101907-14 
Solaris 2.4_x86: 101908-14 
Solaris 2.5: 104015-01 
Solaris 2.5_x86: 104016-01 
Solaris 2.5.1: 104010-01 
Solaris 2.5.1_x86: 104011-01

Sites that do not require the vold functionality should remove the complete set of Volume Management packages. These are SUNWvolg, SUNWvolu and SUNWvolr. These packages can be removed using pkgrm(1M).

Alternatively, to prevent rmmount(1M) creating temporary files, sites must edit the /etc/rmmount.conf file and comment out (or remove) any entry which references action_filemgr.so.

The standard /etc/rmmount.conf contains the following entries which must be commented out (or deleted) to remove this vulnerability:

    action cdrom action_filemgr.so
    action floppy action_filemgr.so

After applying this workaround, an example of /etc/rmmount.conf may look like:

    # @(#)rmmount.conf 1.2     92/09/23 SMI
    #
    # Removable Media Mounter configuration file.
    #

    # File system identification
    ident hsfs ident_hsfs.so cdrom
    ident ufs ident_ufs.so cdrom floppy pcmem
    ident pcfs ident_pcfs.so floppy pcmem

    # Actions
    #
    # Following two lines commented out to remove vold vulnerability
    #
    # action cdrom action_filemgr.so
    # action floppy action_filemgr.so

Note that vold does not have to be restarted for these changes to take effect.

Short Description

Solaris vold(1M) daemon contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when removable media devices are installed/configured and the program creates temporary files. It's possible to cause vold to create or overwrite arbitrary commands on the file system, leading to a loss of integrity.

References:

Other Advisory URL: ftp://ftp.auscert.org.au/pub/auscert/advisory/AL-96.04.Solaris-2.x.vold.vulnerability ISS X-Force ID: 434 CVE-1999-0134 CERT: CA-1996-17