-----BEGIN PGP SIGNED MESSAGE----- ________________________________________________________________________________ Sun Microsystems, Inc. Security Bulletin Bulletin Number: #00151 Date: August 20, 1997 Cross-Ref: Title: Vulnerability in automounter ________________________________________________________________________________ Permission is granted for the redistribution of this Bulletin, so long as the Bulletin is not edited and is attributed to Sun Microsystems. Portions may also be excerpted for re-use in other security advisories so long as proper attribution is included. Any other use of this information without the express written consent of Sun Microsystems is prohibited. Sun Microsystems expressly disclaims all liability for any misuse of this information by any third party. ________________________________________________________________________________ 1. Bulletins Topics Sun announces the release of patches for Solaris 2.5.1, 2.5, 2.4, and 2.3 (SunOS 5.5.1, 5.5, 5.4, and 5.3), which relate to a vulnerability in the automounter program. Sun strongly recommends that you install the patches listed in section 4 immediately on systems running SunOS 5.5.1, 5.5, 5.4, and 5.3. 2. Who is Affected Vulnerable: SunOS versions 5.5.1, 5.5.1_x86, 5.5, 5.5_x86, 5.4, 5.4_x86, and 5.3. Not vulnerable: All other supported versions of SunOS The vulnerability is fixed in Solaris 2.6. 3. Understanding the Vulnerability The automounter daemon automountd is an RPC server that answers file system mount and unmount requests from the autofs filesystem. Unprivileged users may exploit this vulnerability to send RPCs to automountd to change mount options of a file system. 4. List of Patches The vulnerability in automounter is fixed by the following patches: OS version Patch ID __________ ________ SunOS 5.5.1 104654-03 SunOS 5.5.1_x86 104655-01 SunOS 5.5 103187-29 SunOS 5.5_x86 103188-25 SunOS 5.4 101945-50 SunOS 5.4_x86 101946-44 SunOS 5.3 101318-87 5. Checksum Table The checksum table below shows the BSD checksums (SunOS 5.x: /usr/ucb/sum), SVR4 checksums (SunOS 5.x: /usr/bin/sum), and the MD5 digital signatures for the above-mentioned patches that are available from: These checksums may not apply if you obtain patches from your answer centers. File Name BSD SVR4 MD5 _______________ _________ __________ ________________________________ 104654-03.tar.Z 24600 156 2056 312 B3EE8F82F04E5417ADA98FCB05E502AF 104655-01.tar.Z 44811 134 58967 267 95C4806913F7BB7184E2CE27B8FF407E 103187-29.tar.Z 47938 3240 14585 6479 D681C0BB1C4267418AEB20F56DDE7FD3 103188-25.tar.Z 07195 2880 23176 5760 6707EAB1BD10B845F535E131836F8DC5 101945-50.tar.Z 04413 10909 4073 21817 198EAAAC3D92898622351C43F87E884F 101946-44.tar.Z 10072 5540 36413 11080 92D61AD71C77F56CA1DF6038D644B4F9 101318-87.tar.Z 45783 11292 55998 22584 395AD525FD411904A3BD03E7E02EED10 _______________________________________________________________________________ APPENDICES A. Patches listed in this bulletin are available to all Sun customers via World Wide Web at: Customers with Sun support contracts can also obtain patches from local Sun answer centers and SunSITEs worldwide. B. Sun security bulletins are available via World Wide Web at: C. Sun Security Coordination Team's PGP key is available via World Wide Web at: D. To report or inquire about a security problem with Sun software, contact one or more of the following: - Your local Sun answer centers - Your representative computer security response team, such as CERT - Sun Security Coordination Team. Send email to: security-alert@sun.com E. To receive information or subscribe to our CWS (Customer Warning System) mailing list, send email to: security-alert@sun.com with a subject line (not body) containing one of the following commands: Command Information Returned/Action Taken _______ _________________________________ help An explanation of how to get information key Sun Security Coordination Team's PGP key list A list of current security topics query [topic] The email is treated as an inquiry and is forwarded to the Security Coordination Team report [topic] The email is treated as a security report and is forwarded to the Security Coordinaton Team. Please encrypt sensitive mail using Sun Security Coordination Team's PGP key send topic A short status summary or bulletin. For example, to retrieve a Security Bulletin #00138, supply the following in the subject line (not body): send #138 subscribe Sender is added to our mailing list. To subscribe, supply the following in the subject line (not body): subscribe cws your-email-address Note that your-email-address should be substituted by your email address. unsubscribe Sender is removed from the CWS mailing list. ________________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBM/tkNrdzzzOFBFjJAQFTAwP+PXFAJgz/t8GNESU10nmToKPYMbCsUSlX CGnYi54vSZEdyGoYQXZfDiSGiRzIHcp2hKAaIFc2w929s4IpbM9ABp83A1U0Yi5b zUX6d14Qsm0/FwP0VOU+Ua8/2Vr3zWF5oqJ7AcP9Z9nXc1xbK7ubJuqwgu5Py9gR eg6UmwzDbgs= =UlQA -----END PGP SIGNATURE-----