fkie_cve-2009-3706
Vulnerability from fkie_nvd
Published
2009-10-16 16:30
Modified
2024-11-21 01:08
Severity ?
Summary
Unspecified vulnerability in the ZFS filesystem in Sun Solaris 10, and OpenSolaris snv_100 through snv_117, allows local users to bypass intended limitations of the file_chown_self privilege via certain uses of the chown system call.
Impacted products
Vendor Product Version
sun opensolaris snv_100
sun opensolaris snv_101
sun opensolaris snv_102
sun opensolaris snv_103
sun opensolaris snv_104
sun opensolaris snv_105
sun opensolaris snv_106
sun opensolaris snv_107
sun opensolaris snv_108
sun opensolaris snv_109
sun opensolaris snv_110
sun opensolaris snv_111
sun opensolaris snv_112
sun opensolaris snv_113
sun opensolaris snv_114
sun opensolaris snv_115
sun opensolaris snv_116
sun opensolaris snv_117
sun solaris 10
sun solaris 10.0
sun opensolaris snv_100
sun opensolaris snv_101
sun opensolaris snv_102
sun opensolaris snv_103
sun opensolaris snv_104
sun opensolaris snv_105
sun opensolaris snv_106
sun opensolaris snv_107
sun opensolaris snv_108
sun opensolaris snv_109
sun opensolaris snv_110
sun opensolaris snv_111
sun opensolaris snv_112
sun opensolaris snv_113
sun opensolaris snv_114
sun opensolaris snv_115
sun opensolaris snv_116
sun opensolaris snv_117
sun solaris 10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "5BE8232A-2464-449A-A7B6-D44447AA9080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "37D9D7A5-63F5-49F6-90EE-EBE5B3FA6DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "6061C499-21A8-4EC4-B5AD-F6E876B15C48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_103:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "677C89EB-1575-46B6-A07C-C8BAA829F620",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_104:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "59679597-3883-4D20-A6E6-0C1CB0BAB3E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_105:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "98368E28-F8A9-40E3-ADB4-BF9F9F20F76D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_106:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "A799B071-D0A6-47C4-80DF-75AB9ADD2916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_107:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "58A9EC84-8FD4-455F-95DE-FBFD67A1441E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_108:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "BB9190F5-DF79-4EFC-B8B8-5B373BCDD1F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_109:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "264D137D-0B78-4F47-AA9F-427D535A1AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_110:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "7D970B1B-44C6-443B-9029-D7182782BD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_111:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "A4CA00AD-837E-4E3E-AE7E-A49CC3AF44A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_112:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "698744C6-2A65-478B-A846-099E6C86D0B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_113:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "EEF667A1-1AE1-42D4-8DB4-CE414CEA3E8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_114:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "EE9DD764-8B9F-4922-BFAD-3FCC56CF9705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_115:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "78B80C92-7EB5-4343-B830-32E8C011E572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_116:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "46E4ED9C-F013-48D2-8642-E5BA7599A512",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_117:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "A1E8108D-3CE7-4041-9027-1CA7473389EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "7FBA68F0-4577-46F5-A754-D365B6EFF872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "7BF232A9-9E0A-481E-918D-65FC82EF36D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*",
              "matchCriteriaId": "1F2CB558-9390-4AAE-A66D-E3DA537E3115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*",
              "matchCriteriaId": "5ED4FAD0-E91F-438D-A3CB-BACFB7F7E975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*",
              "matchCriteriaId": "411B33D1-F55D-42C0-9046-040ABC42E31B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_103:*:x86:*:*:*:*:*",
              "matchCriteriaId": "0491828F-8BB7-4463-AEE7-BFA0C574B6A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_104:*:x86:*:*:*:*:*",
              "matchCriteriaId": "CE4D5683-259F-449E-B1C7-2BD81CC4805F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_105:*:x86:*:*:*:*:*",
              "matchCriteriaId": "42B7F288-2D35-4988-97B0-C529485033C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_106:*:x86:*:*:*:*:*",
              "matchCriteriaId": "F276AFE2-B501-4355-9716-9D1A75AD09CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_107:*:x86:*:*:*:*:*",
              "matchCriteriaId": "8ADE7EBB-8014-459F-A189-9D902BEE1FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_108:*:x86:*:*:*:*:*",
              "matchCriteriaId": "FF3DEB74-D65C-427A-8907-6044238E8C03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_109:*:x86:*:*:*:*:*",
              "matchCriteriaId": "A7A2D975-A03A-494A-8CFE-2D8932906C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_110:*:x86:*:*:*:*:*",
              "matchCriteriaId": "5B3DB52A-595F-4A50-98D5-DF308471B823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_111:*:x86:*:*:*:*:*",
              "matchCriteriaId": "B3BBCE23-9F15-45CD-859F-77ED540B51F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_112:*:x86:*:*:*:*:*",
              "matchCriteriaId": "053A0DA6-483C-49BB-BC7A-E624DB2C269E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_113:*:x86:*:*:*:*:*",
              "matchCriteriaId": "447212A4-FACD-475E-A62B-60FE6504F63E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_114:*:x86:*:*:*:*:*",
              "matchCriteriaId": "AB694DC0-407A-4555-8B72-DAF3C169DCE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_115:*:x86:*:*:*:*:*",
              "matchCriteriaId": "535FF689-13A2-40C6-8706-7782038FDBD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_116:*:x86:*:*:*:*:*",
              "matchCriteriaId": "843246D3-C2DA-454D-916A-AC8905E5134E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_117:*:x86:*:*:*:*:*",
              "matchCriteriaId": "244B7FE4-C485-4993-9810-3433C83A120E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*",
              "matchCriteriaId": "E79CFAA6-A08A-4C70-A3D9-B02C29A17FF2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the ZFS filesystem in Sun Solaris 10, and OpenSolaris snv_100 through snv_117, allows local users to bypass intended limitations of the file_chown_self privilege via certain uses of the chown system call."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el sistema de archivos ZFS en Sun Solaris 10 y OpenSolaris snv_100 hasta snv_117, permite a usuarios locales eludir las limitaciones de permisos de file_chown_self a trav\u00e9s de determinados usos de la llamada al sistema chown."
    }
  ],
  "evaluatorComment": "Per:  http://sunsolve.sun.com/search/document.do?assetkey=1-66-265908-1\r\n\r\n\"Notes:\r\n\r\n1. Solaris 8 and 9 are not impacted by this issue.\r\n\r\n2. OpenSolaris distributions may include additional bug fixes above and beyond the build from which it was derived. The base build can be derived as follows:\r\n\r\n$ uname -v\r\nsnv_86\r\n\r\n3. This issue only affects systems with ZFS file systems where local users have been granted the {PRIV_FILE_CHOWN_SELF} (see chown(2)) privilege which allows them to modify ownership of files where the ownership matches the user\u0027s current effective user ID. If the default operating system configuration option \u0027{_POSIX_CHOWN_RESTRICTED}\u0027 has been disabled then the \u0027file_chown_self\u0027 privilege is asserted in the inheritable set of all processes unless overridden by policy.conf(4) or user_attr(4).\"",
  "evaluatorImpact": "Per:  http://sunsolve.sun.com/search/document.do?assetkey=1-66-265908-1\r\n\r\n1. Impact\r\n\r\nA security vulnerability in the ZFS file system in OpenSolaris and Solaris 10 systems with patches 137137-09 (SPARC) or 137138-09 (x86) installed may allow a local unprivileged user with the \u0027file_chown_self\u0027 privilege to take ownership of files belonging to another user.",
  "id": "CVE-2009-3706",
  "lastModified": "2024-11-21T01:08:00.503",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-10-16T16:30:00.877",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37010"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141444-09-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-265908-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/36702"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2917"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37010"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141444-09-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-265908-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/36702"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2917"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.