Note: This is an archival copy of Security Sun Alert 200863 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000653.1.
Solaris 9 Operating System
Solaris 10 Operating System
Solaris 8 Operating System
Date of Resolved Release
A Security Vulnerability in Low Bandwidth X proxy (lbxproxy(1)) may allow a local unprivileged user, the ability to read some data from any file that has group ownership of root on the system.
lbxproxy(1) is used for making connections to the X11 Display Server (Xserver or Xorg) faster over a low bandWidth connection.
Sun acknowledges with thanks, Charles Morris, Old Dominion University, for discovering and reporting this issue.
This issue can occur in the following releases:
There are no predictable symptoms that would indicate the described issue has been exploited.
To work around the described issue until patches can be applied, users may wish to turn off the set group ID bit for the "lbxproxy" binary. This can be done by issuing the following command as root user:
# chmod g-s /usr/openwin/bin/lbxproxy
After the set group ID permissions have been removed the "lbxproxy" command should be run with the "-pn" option so that the program will continue to run after it fails to establish its well-known sockets and instead listen for client connections over TCP.
The DISPLAY environment variable should be set using the format of "hostname:display" instead of just ":display" so that clients will connect over TCP.
This issue is addressed in the following releases:
This solution has no attachment