Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12432
HistoryApr 26, 2006 - 12:00 a.m.

[SA19789] Sun Solaris "libpkcs11" Privilege Escalation Vulnerability

2006-04-2600:00:00
vulners.com
11

TITLE:
Sun Solaris "libpkcs11" Privilege Escalation Vulnerability

SECUNIA ADVISORY ID:
SA19789

VERIFY ADVISORY:
http://secunia.com/advisories/19789/

CRITICAL:
Less critical

IMPACT:
Privilege escalation

WHERE:
Local system

OPERATING SYSTEM:
Sun Solaris 10
http://secunia.com/product/4813/

DESCRIPTION:
A vulnerability has been reported in Solaris, which can be exploited
by malicious, local users to gain escalated privileges.

The vulnerability is caused due to an error in the "getpwnam()"
family of non-reentrant functions provided by the "libpkcs11(3LIB)"
library. This can be exploited by local users to execute arbitrary
code with escalated privileges if a privileged application is linked
with the library and uses the data returned by "getpwnam()" and
related functions.

The vulnerability has been reported in Solaris 10 on both SPARC and
x86 platforms.

SOLUTION:
Apply patches.

– SPARC Platform –

Solaris 10 (Global):
Apply patch 118918-14 or later.
http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-118918-14-1

Solaris 10 (Restricted):
Apply patch 118562-09 or later.
http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-118562-09-1

– x86 Platform –

Solaris 10 (Global):
Apply patch 118919-12 or later.
http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-118919-12-1

Solaris 10 (Restricted):
Apply patch 118563-07 or later.
http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-118563-07-1

PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.

ORIGINAL ADVISORY:
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102316-1


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.