Note: This is an archival copy of Security Sun Alert 252767 as previously published on http://sunsolve.sun.com. Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1020129.1. |
Category Security Release Phase Resolved 6799884 Product Sun Enterprise Authentication Mechanism 1.0.1 Solaris 9 Operating System Solaris 10 Operating System OpenSolaris Date of Workaround Release 10-Mar-2009 Date of Resolved Release 25-Mar-2009 A Security Vulnerability in the Solaris Kerberos PAM Module May Allow Use of a User Specified Kerberos Configuration File, Leading to Escalation of Privileges 1. Impact A security vulnerability in the Solaris Kerberos (see kerberos(5)) pam_krb5(5) PAM module may allow a user supplied Kerberos configuration file to be used to specify realm and KDC server information, thereby allowing certain remote unprivileged users or applications to gain elevated privileges. Sun acknowledges with thanks, Russ Allbery and Steven Luo for bringing this issue to our attention. This issue is also described in the following documents: CVE-2009-0360 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0360
CVE-2009-0361 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0361 2. Contributing Factors This issue can occur in the following releases: SPARC Platform
$ uname -vNote: This issue could affect all systems utilizing Kerberos via /etc/pam.conf. To determine if your system is using Kerberos thru the pam stack, the following command can be run: $ grep pam_krb5 /etc/pam.conf | grep -v #If any lines are returned after running this command, then the system is exposed to this vulnerability. Example: $ grep pam_krb5 /etc/pam.conf | grep -v # 3. Symptoms There are no predictable symptoms to indicate this issue has been exploited to gain elevated privileges. 4. Workaround There is no workaround for this issue. Please see the Resolution section below. 5. Resolution This issue is addressed in the following releases: SPARC Platform
This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Sun.com Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements. Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. Modification History 05-Mar-2009: Updated Workaround section 10-Mar-2009: Updated Workaround section for IDRs 25-Mar-2009: Updated Contributing Factors and Resolution sections; issue is Resolved 21-May-2009: Updated Contributing Factors section for clarifications References138371-06138372-06 112237-16 112238-15 112390-14 112240-13 112908-34 115168-19 Attachments This solution has no attachment |
|