First published: Wed Dec 31 2003(Updated: )
A race condition in the at command for Solaris 2.6 through 9 allows local users to delete arbitrary files via the -r argument with .. (dot dot) sequences in the job name, then modifying the directory structure after at checks permissions to delete the file and before the deletion actually takes place.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SunOS | =5.7 | |
SunOS | =5.5 | |
SunOS | =5.8 | |
Oracle Solaris and Zettabyte File System (ZFS) | =9.0 | |
Oracle Solaris and Zettabyte File System (ZFS) | =7.0 | |
Oracle Solaris and Zettabyte File System (ZFS) | =9.0 | |
SunOS | =5.5.1 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.6 | |
Oracle Solaris and Zettabyte File System (ZFS) | =8.0 | |
SunOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1073 is classified as a moderate severity vulnerability due to its impact on local user file deletion.
CVE-2003-1073 exploits a race condition in the at command allowing users to delete arbitrary files through modified job names.
CVE-2003-1073 affects local users on Solaris versions 2.6 through 9, inclusive.
To protect against CVE-2003-1073, avoid using the at command with untrusted input and restrict local user permissions.
While specific patches may vary, users should consult their Solaris documentation for recommended updates to mitigate CVE-2003-1073.