===================================================================== CERT-Renater Note d'Information No. 2006/VULN125 _____________________________________________________________________ DATE : 31/03/2006 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Systems running Sun Cluster 3.1 4/04. ====================================================================== Sun(sm) Alert Notification * Sun Alert ID: 102278 * Synopsis: Security Vulnerability in the SunPlex Manager Software Delivered With Sun Cluster 3.1 4/04 * Category: Security * Product: Sun Cluster 3.1 * BugIDs: 5076947 * Avoidance: Upgrade * State: Resolved * Date Released: 29-Mar-2006 * Date Closed: 29-Mar-2006 * Date Modified: 1. Impact A local user who has been granted the "solaris.cluster.gui" authorization may be able to view files which would normally be inaccessible to that user due to a security vulnerability in the Sun Cluster SunPlex Manager GUI. 2. Contributing Factors This issue can occur in the following releases: SPARC Platform * Sun Cluster 3.1 4/04 (for Solaris 8 and 9) x86 Platform * Sun Cluster 3.1 4/04 (for Solaris 9) Notes: 1. Sun Cluster 3.1 4/04 is not supported on Solaris 10. 2. Sun Cluster 3.1 versions later than 4/04 are not affected by this issue. 3. Sun Cluster 3.0 and earlier are not affected by this issue. To determine if Sun Cluster 3.1 4/04 is installed on a system, the following command can be run: $ /usr/cluster/bin/scinstall -p | grep 3.1u2 3.1u2 If the system returns 3.1u2 (as in the example above), then it is impacted by this issue. To determine if a local user has been granted the "solaris.cluster.gui" the auths(1) command can be used, as in the following example: $ auths username solaris.system.date,solaris.cluster.gui 3. Symptoms There are no predictable symptoms that would indicate the described issue has occurred. 4. Relief/Workaround To work around the described issue, temporarily disable SunPlex Manager by running the script as shown below (as 'root'): # /etc/init.d/initspm stop Note: Disabling this service will mean that users will be unable to administer the Sun Cluster software using the SunPlex Manager Software. 5. Resolution This issue is addressed in the following releases: SPARC Platform * Sun Cluster 3.1 9/04 (for Solaris 8 and 9) or later x86 Platform * Sun Cluster 3.1 9/04 (for Solaris 9) or later Note: It is necessary to install or upgrade to Sun Cluster 3.1 9/04 or later. This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Sun.com Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements. Copyright 2000-2006 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved ====================================================================== ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 151 bd de l'Hopital | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================