Date: Fri, 29 Mar 2024 10:10:19 -0400 (EDT) Message-ID: <380120462.43.1711721419739@windcrest.sei.cmu.edu> Subject: Exported From Confluence MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_Part_42_1173100577.1711721419736" ------=_Part_42_1173100577.1711721419736 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Content-Location: file:///C:/exported.html
A complete revision history is at the end of this file.
The text of this advisory was originally released on July 26, 1996, as A= USCERT Advisory AL-96.02, developed by the Australian Computer Emergency Re= sponse Team. Because of the seriousness of the problem, we are reprinting t= he AUSCERT advisory here with their permission. Only the contact informatio= n at the end has changed: AUSCERT contact information has been replaced wit= h CERT/CC contact information.
Note that this vulnerability also affects Solaris 2.5.1.
The CERT/CC has received reports that this vulnerability has been exploi= ted.
We will update this advisory as we receive additional information. Pleas= e check advisory files regularly for updates that relate to your site.
AUSCERT have received a report of a vulnerability in the Sun Microsystem= s Solaris 2.5 distribution involving the programs kcms_calibrate and kcms_c= onfigure. These programs are part of the Kodak Color Management System (KCM= S) packages.
This vulnerability may allow any local user to gain root privileges.
Exploit details involving this vulnerability have been made publicly ava= ilable.
At this stage, AUSCERT is not aware of any official patches. AUSCERT rec= ommends that sites take the actions suggested in Section 3 until official p= atches are available.
Depending on the local sites' requirements, the Solaris 2.5 KCMS package= s may or may not have been installed. AUSCERT recommends that individual si= tes should determine whether the programs are installed and take appropriat= e action.
This Alert will be updated as more information becomes available.
=
p>
KCMS includes the programs kcms_configure and kcms_calibrate which are u= sed for the configuration and calibration of an X11 window system for use w= ith the KCMS library. When installed, these programs have set-user-id root = and set-group-id bin privileges.
A vulnerability involving these programs has been reported. Exploit deta= ils involving this vulnerability have been made publicly available.
Depending on the local sites' requirements, the Solaris 2.5 KCMS package= s may or may not have been installed.
Until official patches are available sites are encouraged to remove the = setuid and setgid permissions on the kcms_calibrate and kcms_configure prog= rams. These are typically located in /usr/openwin/bin.
AUSCERT wishes to thanks Marek Krawus of the University of Queensland fo= r his assistance in this matter.
Copyright 1996, 1997 Carnegie Mellon University.
Oct. 20, 1997 Vendor information for Sun has been added to the UPDATES section Sep. 24, 1997 Updated copyright statement=20 Feb. 25, 1997 Introduction - added information that CERT/CC has received reports of this vulnerability being exploited. Added copyright information. Aug. 30, 1996 Information previously in the README was inserted into the advisory. Beginning of the AUSCERT text - removed AUSCERT advisory header to avoid confusion. Aug. 02, 1996 Introduction - added information about Solaris 2.5.1.