Note: This is an archival copy of Security Sun Alert 201790 as previously published on http://sunsolve.sun.com. Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1001328.1. |
Category Security Release Phase Resolved Solaris 10 Operating System Bug Id 6396593 Date of Workaround Release 20-MAR-2006 Date of Resolved Release 28-MAR-2006 Impact The Xorg X server (see Xorg(1)) is one of the X Window System display servers available on the Solaris x86 platform. A local unprivileged user may be able to create or overwrite any file on the system or execute arbitrary code with elevated privileges due to several security vulnerabilities found in the Xorg X server. Sun acknowledges, with thanks, the X.Org Foundation for bringing these issues to our attention. Sun also thanks Coverity for donating their 'Coverity Prevent' product to the X.Org Foundation which uncovered these issues. These issues are referenced in the following document: CVE-2006-0745 at: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0745 Contributing Factors These issues can occur in the following releases: x86 Platform
Note: This issue only affects Xorg(1) X server releases 6.9 and 7.0. To determine the version of the Xorg X server the following command can be run: $ /usr/X11/bin/Xorg -version X Window System Version 6.8.0 (Sun Xorg Release 1.1 for Solaris 10) Release Date: 8 September 2004 X Protocol Version 11, Revision 0, Release 6.8 [...]
Symptoms There are no predictable symptoms that would show if one of the described vulnerabilities has been exploited to execute arbitrary code with elevated privileges. There also aren't any predicable symptoms which would show a system file had been overwritten as it would depend on which file had been modified. Workaround Either of the following options are valid workarounds until the resolution patch can be installed on the system. 1) Backout patch 118966-14/15/16 if possible (i.e. if not freshbitted and not installed without saving files for backout) using patchrm(1M) as the root user. For example: # patchrm 118966-14 OR 2) Remove the setuid(2) bit from the Xorg server. For example as the root user the following command can be run: # chmod 755 /usr/X11/bin/Xorg Note that removing the setuid bit from the Xorg server will prevent non-root users from being able to start Xorg on Solaris x86 via the command line (typically via xinit(1)). Xorg will still be available when started via a display manager such as dtlogin(1), gdm(1) or xdm(1).
Resolution This issue is addressed in the following releases: x86 Platform
Modification History Date: 28-MAR-2006
References118966-18Attachments This solution has no attachment |
|