The NFS daemon (aka nfsd) in Sun Solaris 10 and OpenSolaris before snv_106, when NFSv3 is used, does not properly implement combinations of security modes, which allows remote attackers to bypass intended access restrictions and read or modify files, as demonstrated by a combination of the sec=sys and sec=krb5 security modes, related to modes that "override each other."
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2009/0814 | vdb entry |
http://secunia.com/advisories/34435 | third party advisory |
http://securitytracker.com/id?1021832 | vdb entry exploit |
http://support.avaya.com/elmodocs2/security/ASA-2009-096.htm | |
http://sunsolve.sun.com/search/document.do?assetkey=1-21-139462-02-1 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49171 | vdb entry |
http://www.vupen.com/english/advisories/2009/0657 | vdb entry vendor advisory |
http://www.securityfocus.com/bid/34062 | vdb entry exploit |
http://secunia.com/advisories/34225 | third party advisory vendor advisory |
http://osvdb.org/52560 | vdb entry |
http://sunsolve.sun.com/search/document.do?assetkey=1-66-250306-1 | patch vendor advisory |