Note: This is an archival copy of Security Sun Alert 201196 as previously published on http://sunsolve.sun.com.
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000898.1.
Article ID : 1000898.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2004-02-23
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Security Issue with kcms_server Daemon



Category
Security

Release Phase
Resolved

Product
Solaris 9 Operating System
Solaris 2.6 Operating System
Solaris 7 Operating System
Solaris 8 Operating System

Bug Id
4774256

Date of Workaround Release
23-JAN-2003

Date of Resolved Release
24-FEB-2004

Impact

A local or remote unprivileged user may be able to view root privileged files due to a security vulnerability involving the Solaris kcms_server(1) daemon.

The Solaris kcms_server(1) daemon is part of the Kodak Color Management System (KCMS), an API and libraries to create and manage profiles that can describe and control the color performance of digital color images on desktop computers and associated peripherals. The kcms_server(1) daemon is enabled by default in the inetd.conf(4) file.

This issue is described in the CERT Vulnerability VU#850785 (see http://www.kb.cert.org/vuls/id/850785) and the Entercept Security Alert at: http://www.entercept.com/news/uspr/01-22-03.asp.

Sun acknowledges with thanks, Sinan Eren of the Entercept Ricochet Team, for bringing this issue to our attention.


Contributing Factors

This issue can occur in the following releases:

SPARC

  • Solaris 2.6 without patch 107336-02
  • Solaris 7 without patch 107337-03
  • Solaris 8 without patch 111400-02
  • Solaris 9 without patch 114636-01

Intel

  • Solaris 2.6 without patch 107338-02
  • Solaris 7 without patch 107339-03
  • Solaris 8 without patch 111401-02
  • Solaris 9 without patch 114637-01

Symptoms

There are no reliable symptoms that would show the described issue has been exploited to gain access to view root privileged files.


Workaround

The following workarounds can be implemented as the root user to prevent an exploit for this issue from succeeding:

1. Disable the kcms_server(1) daemon on all systems.

a) Edit the "/etc/inetd.conf" file and comment out the following line by prepending the '#' symbol as follows.

	# 100221/1  tli  rpc/tcp wait root /usr/openwin/bin/kcms_server kcms_server

b) Instruct the inetd(1M) process to reread the newly modified "/etc/inetd.conf" file by sending it a hangup signal, SIGHUP:

	$ ps -ef | grep inetd
	$ kill -HUP <pid of inetd from above ps output>

2. Remove the KCMS related packages using pkgrm(1) as the root user.

The following are the KCMS packages:

Core KCMS packages:

	application SUNWkcslx   KCMS Runtime Library (64-bit)
	application SUNWkcspf   KCMS Optional Profiles
	application SUNWkcspg   KCMS Programmers Environment
	application SUNWkcspx   KCMS Programmers Environment (64-bit)
	system      SUNWkcsrl   KCMS Runtime Library Support
	system      SUNWkcsrr   KCMS Runtime Profiles
	application SUNWkcsrt   KCMS Runtime Environment
	application SUNWkcsrx   KCMS Runtime Environment (64-bit)

Translated KCMS packages:

	ALE         SUNWckcsr   Simplified Chinese (EUC) KCMS Runtime Environment
	application SUNWdkcsr   German KCMS Runtime Environment
	application SUNWekcsr   Spanish KCMS Runtime Environment
	application SUNWfkcsr   French KCMS Runtime Environment
	ALE         SUNWhkcsr   Traditional Chinese (EUC) KCMS Runtime Environment
	application SUNWikcsr   Italian KCMS Runtime Environment
	application SUNWjkcsr   Japanese KCMS Runtime Environment
	ALE         SUNWkkcsr   Korean (EUC) KCMS Runtime Environment
	application SUNWskcsr   Swedish KCMS Runtime Environment

Resolution

This issue is addressed in the following releases:

SPARC Platform

  • Solaris 2.6 with patch 107336-02 or later
  • Solaris 7 with patch 107337-03 or later
  • Solaris 8 with patch 111400-02 or later
  • Solaris 9 with patch 114636-01 or later

x86 Platform

  • Solaris 2.6 with patch 107338-02 or later
  • Solaris 8 with patch 111401-02 or later
  • Solaris 7 with patch 107339-03 or later
  • Solaris 9 with patch 114637-01 or later

A final resolution is pending completion for Solaris 8 x86.



Modification History
Date: 08-AUG-2003
  • Updated Contributing Factors and Resolution sections

Date: 10-FEB-2004
  • Updated Contributing Factors and Resolution sections

Date: 24-FEB-2004
  • Updated Contributing Factors and Resolution sections
  • State: Resolved



References

107336-02
107337-03
111400-02
114636-01
107338-02
107339-03
114637-01
111401-02




Attachments
This solution has no attachment