Vulnerabilities > CVE-2009-1207 - Race Condition vulnerability in SUN Opensolaris and Solaris
Attack vector
LOCAL Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Race condition in the dircmp script in Sun Solaris 8 through 10, and OpenSolaris snv_01 through snv_111, allows local users to overwrite arbitrary files, probably involving a symlink attack on temporary files.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Leveraging Race Conditions This attack targets a race condition occurring when multiple processes access and manipulate the same resource concurrently and the outcome of the execution depends on the particular order in which the access takes place. The attacker can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance a race condition can occur while accessing a file, the attacker can trick the system by replacing the original file with his version and cause the system to read the malicious file.
- Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. The typical example is the file access. The attacker can leverage a file access race condition by "running the race", meaning that he would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the attacker could do something such as replace the file and cause an escalation of privilege.
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_141015-01.NASL description SunOS 5.10_x86: /usr/bin/dircmp patch. Date this patch was last updated by Sun : Mar/19/09 last seen 2020-06-01 modified 2020-06-02 plugin id 108023 published 2018-03-12 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/108023 title Solaris 10 (x86) : 141015-01 NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_141015.NASL description SunOS 5.10_x86: /usr/bin/dircmp patch. Date this patch was last updated by Sun : Mar/19/09 last seen 2018-09-01 modified 2018-08-13 plugin id 37297 published 2009-04-23 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=37297 title Solaris 10 (x86) : 141015-01 NASL family Solaris Local Security Checks NASL id SOLARIS9_138896.NASL description SunOS 5.9: usr/bin/dircmp patch. Date this patch was last updated by Sun : Mar/19/09 last seen 2020-06-01 modified 2020-06-02 plugin id 38075 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/38075 title Solaris 9 (sparc) : 138896-01 NASL family Solaris Local Security Checks NASL id SOLARIS10_141014.NASL description SunOS 5.10: /usr/bin/dircmp patch. Date this patch was last updated by Sun : Mar/19/09 last seen 2018-09-01 modified 2018-08-13 plugin id 36861 published 2009-04-23 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=36861 title Solaris 10 (sparc) : 141014-01 NASL family Solaris Local Security Checks NASL id SOLARIS8_140837.NASL description SunOS 5.8: usr/bin/dircmp patch. Date this patch was last updated by Sun : Mar/19/09 last seen 2020-06-01 modified 2020-06-02 plugin id 36494 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/36494 title Solaris 8 (sparc) : 140837-01 NASL family Solaris Local Security Checks NASL id SOLARIS9_X86_138897.NASL description SunOS 5.9_x86: usr/bin/dircmp patch. Date this patch was last updated by Sun : Mar/19/09 last seen 2020-06-01 modified 2020-06-02 plugin id 37711 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/37711 title Solaris 9 (x86) : 138897-01 NASL family Solaris Local Security Checks NASL id SOLARIS10_141014-01.NASL description SunOS 5.10: /usr/bin/dircmp patch. Date this patch was last updated by Sun : Mar/19/09 last seen 2020-06-01 modified 2020-06-02 plugin id 107525 published 2018-03-12 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107525 title Solaris 10 (sparc) : 141014-01 NASL family Solaris Local Security Checks NASL id SOLARIS8_X86_140838.NASL description SunOS 5.8_x86: usr/bin/dircmp patch. Date this patch was last updated by Sun : Mar/19/09 last seen 2020-06-01 modified 2020-06-02 plugin id 37644 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/37644 title Solaris 8 (x86) : 140838-01
Oval
accepted | 2009-05-18T04:00:26.719-04:00 | ||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||
description | Race condition in the dircmp script in Sun Solaris 8 through 10, and OpenSolaris snv_01 through snv_111, allows local users to overwrite arbitrary files, probably involving a symlink attack on temporary files. | ||||||||||||||||||||||||
family | unix | ||||||||||||||||||||||||
id | oval:org.mitre.oval:def:6183 | ||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||
submitted | 2009-04-02T11:13:52.000-04:00 | ||||||||||||||||||||||||
title | A Security Vulnerability in the Solaris dircmp(1) Shell Script may Allow Overwriting of Arbitrary Files | ||||||||||||||||||||||||
version | 34 |
References
- http://secunia.com/advisories/34558
- http://secunia.com/advisories/34813
- http://sunsolve.sun.com/search/document.do?assetkey=1-21-138897-01-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-253468-1
- http://support.avaya.com/elmodocs2/security/ASA-2009-140.htm
- http://www.securityfocus.com/bid/34316
- http://www.vupen.com/english/advisories/2009/1105
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49526
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6183