Note: This is an archival copy of Security Sun Alert 242006 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1019601.1.
Solaris 10 Operating System
Date of Resolved Release
A Security Vulnerability in the Solaris Name Service Cache Daemon (nscd(1M)) May Allow Unauthorized Access to Data and Escalation of Privileges
A security vulnerability in the Solaris name service cache daemon (nscd(1M)) may, under certain conditions, allow local unprivileged users to gain access to unauthorized information and gain elevated privileges.
Sun acknowledges with thanks, Mike Gerdts for bringing this issue to our attention.
2. Contributing Factors
This issue can occur in the following releases:
1. Solaris 8, Solaris 9 and Solaris 10 releases prior to Solaris 10 Update 4 (8/07) are not impacted by this issue.
2. OpenSolaris distributions may include additional bug fixes above and beyond the build from which it was derived. The base build can be derived as follows:
$ uname -a3. This issue occurs only when nscd(1M) is running and the 'compat' mode is configured for the 'passwd' entry in nsswitch.conf(4).
The following command may be run to check if the nscd(1M) process is running:
$ svcs svc:/system/name-service-cache"online" indicates nscd is running.
STATE STIME FMRI"disabled" indicates nscd is not running.
The following command may be run to check if the 'compat' mode has been configured for the passwd(1) entry in nsswitch.conf(4):
$ grep passwd: /etc/nsswitch.confif the 'compat' mode has been configured for the passwd(1) entry.
There are no predictable symptoms to indicate this issue has been exploited to gain access to unauthorized data or gain elevated privileges.
It is possible to work around the described issue with one of the following options:
A) Disable the nscd(1M) daemon. This may be done by executing the following command as the 'root' user:
# svcadm disable svc:/system/name-service-cacheDisabling nscd(1M) may slow responses to name services requests on the affected host.
B) Remove the 'compat' entry for 'passwd' in the file /etc/nsswitch.conf
C) If the entry for 'passwd_compat' in /etc/nsswitch.conf is either 'nis' or 'ldap', modify the entry for 'passwd' in the same file as follows:
passwd: nisplus compat
If the entry for 'passwd_compat' in /etc/nsswitch.conf is 'nisplus', modify the entry for 'passwd' in the same file as follows:
passwd: yyyyyy compat
where 'yyyyyy' is indeed the string 'yyyyyy' or any string that would not match a existing source.
This issue is addressed in the following releases:
Copyright 2000-2008 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.
05-Jan-2009: Updated Contributing Factors section for patch clarification
This solution has no attachment