Note: This is an archival copy of Security Sun Alert 260508 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1020546.1.
Date of Resolved Release
A security vulnerability in the OpenSolaris idmap(1M) command:
A security vulnerability in the OpenSolaris idmap(1M) command may allow a local unprivileged user to kill the idpmapd(1M) daemon on a CIFS (Common Internet File System/Windows file service) server and cause the idmapd(1M) SMF service to transition to the "maintenance" state (see smf(5)). This is a type of Denial of Service (DoS).
2. Contributing Factors
This issue can occur in the following releases:
Note 2: OpenSolaris distributions may include additional bug fixes above and beyond the build from which it was derived. To determine the base build of OpenSolaris, the following command can be used:
$ uname -vNote 3: Only systems that are configured to be a CIFS server are impacted by this issue. To determine if a system is a CIFS server, check to see if the SMB server service is online:
$ svcs svc:/network/smb/server:default
If the described issue occurs the idmapd(1M) SMF service (svc:/system/idmap) will be in the "maintenance" state and one or more core files may be generated depending on the configuration of coreadm(1M).
The state of the service can be confirmed by using the following command:
$ svcs svc:/system/idmapIf a core file is generated, the start of the stack trace (from pstack(1) for example) will be similar to the following:
libc_hwcap2.so.1`strlen+0x30(0, fea4e9bc, a, 5)4. Workaround
There is no workaround for this issue. However, if the described issue occurs, the system can be recovered by executing the following command as root:
# svcadm clear svc:/system/idmap:defaultNote: This will only recover from the failure and does not prevent further failures.
This issue is addressed in the following releases:
Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.
This solution has no attachment