-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

           ESB-2003.0245 -- NSFOCUS Security Advisory(SA2003-03)
           Solaris dtsession Heap Buffer Overflow Vulnerability
                               03 April 2003

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                dtsession
Vendor:                 Sun Microsystems
Operating System:       Sun Solaris 9
                        Sun Solaris 8
                        Sun Solaris 7
                        Sun Solaris 2.6
                        Sun Solaris 2.5.1
Impact:                 Root Compromise
Access Required:        Existing Account
CVE Names:              CAN-2003-0092

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

NSFOCUS Security Advisory(SA2003-03)

Topic: Solaris dtsession Heap Buffer Overflow Vulnerability

Release Date: 2003-03-31 

CVE CAN ID: CAN-2003-0092

Affected system:
===================

Sun Solaris 2.5.1 (SPARC/x86)
Sun Solaris 2.6 (SPARC/x86)
Sun Solaris 7   (SPARC/x86)
Sun Solaris 8   (SPARC/x86)
Sun Solaris 9   (SPARC/x86)

Summary:
=========

NSFOCUS Security Team has found a buffer overflow vulnerability in dtsession
which is an application in Sun Solaris system. Exploiting the vulnerability
local attackers could gain root privilege.

Description:
============

dtsession is a CDE session manager. It provides session management functionality
that is compatible to ICCCM  1.1 during the users' session (from login to
logout). It launches a window manager and allows to save/restore/lock session,
to launch screen saver, and to allocate colors for desktop compatible clients.

By default setuid root bit is set to CDE dtsession which is shipped
with Solaris. Because valid length check has not been implemented when
handling HOME variable, attackers could cause a heap buffer overflow. By
carefully crafting data attackers could run arbitrary code with root privilege.

Workaround:
=============

NSFOCUS suggests to disable suid root bit of dtsession temporarily:
# chmod a-s /usr/dt/bin/dtsession

Note: This might prevent a user from being to unlock the screen
by the list of keyholders (including root).

Vendor Status:
==============

2002-12-11  Informed the vendor.
2002-12-13  The vendor confirmed the vulnerability.
2003-03-31  The vendor released a Sun Alert and patches for this issue.

The Sun Alert is available at:
http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fsalert/52388

The patches are:

Solaris 2.6     106027-12
Solaris 2.6_x86 106028-12
Solaris 7       107702-12
Solaris 7_x86   107703-12
Solaris 8       109354-19
Solaris 8_x86   109355-18
Solaris 9       114497-01
Solaris 9_x86   114498-01


Additional Information:
========================

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2003-0092 to this issue. This is a candidate for inclusion in the
CVE list (http://cve.mitre.org), which standardizes names for security
problems. Candidates may change significantly before they become official
CVE entries.

DISCLAIMS:
==========
THE INFORMATION PROVIDED IS RELEASED BY NSFOCUS "AS IS" WITHOUT WARRANTY
OF ANY KIND. NSFOCUS DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED,
EXCEPT FOR THE WARRANTIES OF MERCHANTABILITY. IN NO EVENTSHALL NSFOCUS
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL,CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF NSFOCUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
DISTRIBUTION OR REPRODUCTION OF THE INFORMATION IS PROVIDED THAT THE
ADVISORY IS NOT MODIFIED IN ANY WAY.

Copyright 1999-2003 NSFOCUS. All Rights Reserved. Terms of use.


NSFOCUS Security Team <security@nsfocus.com>
NSFOCUS INFORMATION TECHNOLOGY CO.,LTD
(http://www.nsfocus.com)

PGP Key: http://www.nsfocus.com/homepage/research/pgpkey.asc
Key fingerprint = F8F2 F5D1 EF74 E08C 02FE  1B90 D7BF 7877 C6A6 F6DA

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE+iBQm1794d8am9toRAv3WAJ4994uHKPzSHnebVe+yIVszubgXlACfZTGU
CLatpbfB4pgze6IDBpxPOqc=
=16Ev
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBPoxwKih9+71yA2DNAQFoEQP6A7qXgd2OtvNJAfJkd77wrB401X5goA3p
pf86YCpugv20jt0IyUrLlJMuTQi2OplknbmM5/EZsm8tkMorAd0d+ackLmJwLe/o
tIc0Osa49nBMQdOSkOPSbS3us4vH0kvHwghnLt7MdghGnVhvGEyx879TkvXXLkB9
HkmGbVMLTl0=
=xKqs
-----END PGP SIGNATURE-----