SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   OS (UNIX)  >   UFS File System Vendors:   Sun
Solaris UFS File System May Allow Local Users to Deny Service
SecurityTracker Alert ID:  1006233
SecurityTracker URL:  http://securitytracker.com/id/1006233
CVE Reference:   CVE-2003-1077   (Links to External Site)
Updated:  Jul 7 2008
Original Entry Date:  Mar 6 2003
Impact:   Denial of service via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Solaris 9 (SPARC)
Description:   A vulnerability was reported in the Sun Solaris UFS File System. In certain cases, a local user may cause the file system to appear to be hung.

On a UFS file system with logging enabled, Sun reported that a local user may be able to cause the file system to appear to be non-responding. A reboot is required to return to normal operations, according to the alert.

Solaris 9 SPARC is affected. Sun reports that Solaris 2.6, 7, and 8 are not affected.

Systems are only affected if the UFS file system is mounted with the "logging" option enabled. Sun indicates that you can examine the "/etc/vfstab" file to deterine if you have any UFS file systems mounted with logging enabled.

No details regarding how the flaw can be triggered were provided in the Sun Alert. However, the patch description contains the following:

"rm -fr hangs forever because ufs log is full and can't be rolled"

Impact:   A local user can deny service to users of the file system.
Solution:   Sun has released the following patch for Solaris 9 SPARC platform:

patch 113454-03 or later:

http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=113454&rev=04

As a workaround, Sun reports that you can disable logging for UFS file systems by removing the "logging" option in the "/etc/vfstab" and rebooting, or by issuing the following command as a root user for any ufs file system:

# mount -o remount,nologging <mount_point>
This workaround setting will only last until the next reboot, according to Sun.

Vendor URL:  sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F51300 (Links to External Site)
Cause:   Not specified

Message History:   None.


 Source Message Contents

Subject:  Sun ALert 51300 (UFS)


http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F51300

Sun issued Alert 51300 warning of a denial of service vulnerability with the Solaris UFS File
System.  On a UFS file system with logging enabled, a local user may be able to cause the file
system to appear to be non-responding.  A reboot is required to return to normal operations,
according to the alert.

Solaris 9 SPARC is affected.  Sun reports that Solaris 2.6, 7, and 8 are not affected.

Systems are only affected if the UFS file system is mounted with the "logging" option enabled.  Sun
indicates that you can examine the "/etc/vfstab" file to deterine if you have any UFS file systems
mounted with logging enabled.

Sun has released the following patch for Solaris 9 SPARC platform:

patch 113454-04 or later:

http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=113454&rev=04

As a workaround, Sun reports that you can disable logging for UFS file systems by removing the
"logging" option in the "/etc/vfstab" and rebooting, or by issuing the following command as a root
user for any ufs file system:

    # mount -o remount,nologging <mount_point>
                              
This workaround setting will only last until the next reboot, according to Sun.



-----

Sun Alert ID: 51300 
Synopsis: UFS File Systems With Logging Enabled are Vulnerable to a Denial of Service (DoS) Attack 
Category: Security 
Product: Solaris 
BugIDs: 4640210 
Avoidance: Patch, Workaround 
State: Resolved 
Date Released: 05-Mar-2003 
Date Closed: 05-Mar-2003 
Date Modified:


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC