=====================================================================
                                    CERT-Renater

                         Note d'Information No. 2007/VULN535
_____________________________________________________________________

DATE                      : 20/12/2007

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running Sun Ray Device Manager
                                                               daemon.

======================================================================

Sun(sm) Alert Notification
      * Sun Alert ID: 103175
      * Synopsis: Security Vulnerabilities in the Sun Ray Device Manager
        Daemon
      * Category: Security
      * Product: Sun Ray Server Software 3.1, Sun Ray Server Software
        3.1.1, Sun Ray Server Software 3.0, Sun Ray Server Software 2.0
      * BugIDs: 6571384
      * Avoidance: Patch, Workaround
      * State: Workaround
      * Date Released: 18-Dec-2007
      * Date Closed:
      * Date Modified:

1. Impact

    Security vulnerabilities in the Sun Ray Device Manager daemon
    (utdevmgrd(1M)) may allow a local or remote unprivileged user to
    create or delete arbitrary directories on the server, or cause the
    Device Manager daemon to crash resulting in an interruption of
    peripheral device service to Sun Ray users.

    Sun acknowledges with thanks, Danny Quist and Anthony Clark at Los
    Alamos National Labs for bringing these issues to our attention.

2. Contributing Factors

    These issues can occur in the following releases:

    SPARC Platform
      * Sun Ray Server Software 2.0 (for Solaris 8, 9)
      * Sun Ray Server Software 3.0 (for Solaris 8, 9)
      * Sun Ray Server Software 3.1 (for Solaris 8, 9, and 10) without
        patch 120879-07

    x86 Platform
      * Sun Ray Server Software 3.1 (for Solaris 10) without patch
        120880-07

    Linux
      * Sun Ray Server Software 3.1 without patch 120881-07
      * Sun Ray Server Software 3.1.1 without patch 124388-02

    Note 1: Sun Ray Server Software 4.0 is not affected by these issues.

    Note 2: Sun Ray Server Software 2.0 and 3.0 are not supported on
    Solaris 10.

    Note 3: Sun Ray Server Software 3.0 is not supported on the Solaris
    x86 platform. (3.1 only)

    Note 4: Sun Ray Server Software 3.1 is not supported on Solaris 8 or
    Solaris 9 on the x86 platform. (Solaris 10 only)

    To determine the version of the Sun Ray Server Software on a Solaris
    system, the following command can be run:
     # /usr/bin/pkgparam VERSION SUNWuto
     3.1_32,REV=2005.08.24.08.55

    To determine the version of Sun Ray Server Software on a Linux system,
    the following command can be run:
     # /bin/rpm -q SUNWuto
     SUNWuto-3.1-32.21


3. Symptoms

    If the Sun Ray server has been affected by the directory-related
    vulnerabilities, directories may be found at unexpected locations in
    the filesystem, or directories may be discovered to be missing from
    the filesystem.

    If the Sun Ray server has been affected by the crash vulnerability,
    the "utdevmgrd" process will terminate and will produce a core file in
    "/var/opt/SUNWut/log" or in the location determined by coreadm(1M).

4. Relief/Workaround

    To work around these issues, the Sun Ray Device Manager daemon may be
    made non-executable and existing instances of the daemon may be
    stopped.

    To apply this workaround, execute the following commands:
     # /bin/chmod ogw-x /opt/SUNWut/lib/utdevmgrd
     # /usr/bin/pkill -STOP utdevmgrd
     # /usr/bin/pkill -TERM utdevmgrd
     # /opt/SUNWut/sbin/utrestart

    Note: Applying the above workaround will result in the disabling of
    application access to smartcards, access to USB peripherals, and
    access to serial devices. Mouse, keyboard and audio access will be
    unaffected.

    To undo the workaround, execute the following commands:
     # /bin/chmod ogw+x /opt/SUNWut/lib/utdevmgrd
     # /opt/SUNWut/sbin/utrestart

    Executing "utrestart" will interrupt Sun Ray sessions running on this
    server, but the sessions will continue and may be resumed after the
    restart has completed.

5. Resolution

    These issues are addressed in the following releases:

    SPARC Platform
      * Sun Ray Server Software 3.1 (for Solaris 8, 9, and 10) with patch
        120879-07 or later

    x86 Platform
      * Sun Ray Server Software 3.1 (for Solaris 10) with patch
        120880-07 or later

    Linux Platform
      * Sun Ray Server Software 3.1 without patch 120881-07 or later
      * Sun Ray Server Software 3.1.1 without patch 124388-02 or later

    This Sun Alert notification is being provided to you on an "AS IS"
    basis. This Sun Alert notification may contain information provided by
    third parties. The issues described in this Sun Alert notification may
    or may not impact your system(s). Sun makes no representations,
    warranties, or guarantees as to the information contained herein. ANY
    AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
    WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
    NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT
    YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
    INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE
    OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN.
    This Sun Alert notification contains Sun proprietary and confidential
    information. It is being provided to you pursuant to the provisions of
    your agreement to purchase services from Sun, or, if you do not have
    such an agreement, the Sun.com Terms of Use. This Sun Alert
    notification may only be used for the purposes contemplated by these
    agreements.

    Copyright 2000-2006 Sun Microsystems, Inc., 4150 Network Circle, Santa
    Clara, CA 95054 U.S.A. All rights reserved


======================================================================

           =========================================================
           Les serveurs de référence du CERT-Renater
           http://www.urec.fr/securite
           http://www.cru.fr/securite
           http://www.renater.fr
           =========================================================
           + CERT-RENATER          | tel : 01-53-94-20-44          +
           + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
           + 75013 Paris           | email: certsvp@renater.fr     +
           =========================================================




