Category
Security
Release Phase
Resolved
Bug Id
6679204
Date of Workaround Release02-Jun-2008
Date of Resolved Release03-Dec-2008
A Security Vulnerability in rpc.ypupdated(1M) May Allow Execution of Arbitrary Code When Run in Insecure Mode
1. Impact
A security vulnerability in the rpc.ypupdated(1M) daemon, when
configured to run in the insecure mode via the "-i" option, may allow
local or remote unprivileged users to execute arbitrary code with root
privileges.
2. Contributing Factors
This issue can occur in the following releases:
SPARC Platform:
- Solaris 8 without patch 138885-01
- Solaris 9 without patch 138575-01
- Solaris 10 without patch 139481-01
- OpenSolaris based upon builds snv_01 through snv_89
x86 Platform:
- Solaris 8 without patch 138886-01
- Solaris 9 without patch 138576-01
- Solaris 10 without patch 139482-01
- OpenSolaris based upon builds snv_01 through snv_89
Note: Only OpenSolaris installations including the affected binary
listed below are affected by this issue :
/usr/lib/netsvc/yp/rpc.ypupdated
Note: OpenSolaris distributions may include additional bug fixes above
and beyond the base build from which it was derived. The base build can be derived as follows:
$ uname -a
SunOS phys-node-1 5.11 snv_86 i86pc i386 i86pc
3. Symptoms
There are no predictable symptoms to indicate the described issue has
been exploited to execute arbitrary code.
4. Workaround
To work around the described issue, do not run rpc.ypupdated(1M) using
the "-i" option (insecure mode).
5. Resolution
This issue is addressed in the following releases:
SPARC Platform- Solaris 8 with patch 138885-01 or later
- Solaris 9 with patch 138575-01 or later
- Solaris 10 with patch 139481-01 or later
- OpenSolaris based upon build snv_90 or later
x86 Platform
- Solaris 8 with patch 138886-01 or later
- Solaris 9 with patch 138576-01 or later
- Solaris 10 with patch 139482-01 or later
- OpenSolaris based upon build snv_90 or later
For more information
on Security Sun Alerts, see 1009886.1.
This Sun Alert
notification is being provided to you on
an "AS IS"
basis. This Sun Alert notification may contain information provided by
third parties. The issues described in this Sun Alert notification may
or may not impact your system(s). Sun makes no representations,
warranties, or guarantees as to the information contained herein. ANY
AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU
ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT
OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This
Sun Alert notification contains Sun proprietary and confidential
information. It is being provided to you pursuant to the provisions of
your agreement to purchase services from Sun, or, if you do not have
such an agreement, the Sun.com Terms of Use. This Sun Alert
notification may only be used for the purposes contemplated by these
agreements.
Copyright 2000-2008 Sun Microsystems,
Inc., 4150 Network Circle, Santa
Clara, CA 95054 U.S.A. All rights reserved.
Modification History
23-Jun-2008: Updated Workaround section
03-Dec-2008: Updated Contributing Factors and Resolution sections, now Resolved
ProductSolaris 8 Operating System
Solaris 9 Operating System
Solaris 10 Operating System
References
138575-01
138576-01
138885-01
138886-01
139481-01
139482-01
AttachmentsThis solution has no attachment