Hash: SHA1

             AUSCERT External Security Bulletin Redistribution

                  ESB-2009.0621 -- [Solaris][OpenSolaris]
 Virtual Network Terminal Server Daemon (vntsd(1M)): Increased Privileges
                                2 July 2009


        AusCERT Security Bulletin Summary

Product:              Virtual Network Terminal Server Daemon (vntsd(1M))
Publisher:            Sun Microsystems
Operating System:     Solaris
Impact:               Increased Privileges
                      Inappropriate Access
Access:               Existing Account
CVE Names:            CVE-2009-2282

Original Bulletin:    

Revision History:     July 2 2009: Added CVE Reference
                      June 29 2009: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Solution Type Sun Alert

Solution  262708 : Security Vulnerability in the Virtual Network Terminal 
                   Server Daemon (vntsd(1M)) for Logical Domains (LDoms) 
                   May Allow Unauthorized Access to Guest Domain Console  
Bug ID:            6781539

Product:           Solaris 10 Operating System
Date of Resolved Release: 25-Jun-2009

SA Document Body

Security Vulnerability in the Virtual Network Terminal Server Daemon 
(vntsd(1M))  ... see below:

1. Impact

A security vulnerability in the Solaris Virtual Network Terminal Server
daemon (vntsd(1M)) for Logical Domains (LDoms) may allow local
unprivileged users within the control domain to gain unauthorized
access to the console of a guest domain.

2. Contributing Factors

SPARC Platform

    * Solaris 10 without patch 141778-01
    * OpenSolaris based upon builds snv_41 through snv_108

Notes: Solaris 8 and Solaris 9 are not affected as they do not support 

Solaris on the x86 Platform is not affected by this  issue as Logical Domains 
(LDoms) software is supported only on the SPARC Platform.

3. Symptoms

There are no predictable symptoms to indicate that this issue has been
exploited to gain unauthorized console access to guest domains.

4. Workaround

Until the resolution patches are applied, it is possible to
workaround this issue via one of the following options:

 1. Disable console access to the guest domains. This may be
    done by executing the following command:

	ldmctrl:#>  svcadm disable vntsd

 2. Allow console access to guest domains only from a separate sparse root 
    zone. This may be done by executing the following commands:

	ldmctrl:#>  svcadm disable vntsd
	ldmctrl:#>  svccfg -s vntsd setprop vntsd/listen_addr = 
	ldmctrl:#>  svcadm refresh vntsd
	ldmctrl:#>  svcadm enable vntsd

Firewall rules may be required to allow access only from the
sparse root zone to the ports used by the vntsd(1M) daemon.
Refer to firewall documentation for more information on configuring the tool.

5. Resolution

This issue is addressed in the following releases:

SPARC Platform

    * Solaris 10 with patch 141778-01 or later
    * OpenSolaris based upon builds snv_109 or later

For more information on Security Sun Alerts, see Technical Instruction 
ID 213557

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.

Comment: http://www.auscert.org.au/render.html?it=1967