{"vuid":"VU#100780","idnumber":"100780","name":"Sun Ray Smartcard reader may leave desktop session open when card is quickly removed","keywords":["Sun Ray Smartcard","Sun Ray Server Software","desktop session open","Desk Top Unit","DTU"],"overview":"The Sun Ray Smartcard reader fails to properly detect a \"quick removal, reinsertion and removal of a Smartcard.\"","clean_desc":"The Sun Ray is a thin client computing device designed to process user input and output, and provide access to computing services hosted by a server. Authentication can be accomplished through a smartcard. By design, the smartcard must remain inserted during the user's session. Quoting from sun documentation about smart cards and the Sun Ray: When the user is finished (that is, the smart card is removed), the Authentication Manager is notified. If the user has not logged out, the session is kept alive with all services disconnected from the display. No files are left on the device, as all state is kept on the server, and the screen is cleared. When the user removes the smart card, there are no traces that he or she had been there. There is no risk that the next user to walk up will discover files or see the contents of windows that he or she shouldn't see. A \"quick removal, reinsertion and removal of a Smartcard\" into the smartcard reader is not detected properly under some circumstances. If this occurs, the login session remains connected to the Desk Top Unit (DTU) inappropriately.","impact":"Under some circumstances, a user session may remain available even if the smartcard has been removed, in violation of the security architecture of the system.","resolution":"A fix is pending from the vendor.","workarounds":"Until a fix is available, ensure that all sessions have been disconnected when removing a smartcard from the Sun Ray Smartcard reader.","sysaffected":"","thanks":"Thanks to Sun Microsystems for reporting this vulnerability.","author":"This document was written by Shawn V Hernan.","public":["http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F53922&zone_32=category%3Asecurity","http://www.sun.com/products/sunray/techinfo/smartcards.html","http://www.securityfocus.com/bid/7457"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-04-29T14:34:55Z","publicdate":"2003-04-28T00:00:00Z","datefirstpublished":"2003-06-04T20:31:54Z","dateupdated":"2012-03-14T15:52:45Z","revision":9,"vrda_d1_directreport":"0","vrda_d1_population":"1","vrda_d1_impact":"3","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"10","cam_impact":"15","cam_easeofexploitation":"2","cam_attackeraccessrequired":"1","cam_scorecurrent":"0.129375","cam_scorecurrentwidelyknown":"0.129375","cam_scorecurrentwidelyknownexploited":"0.241875","ipprotocol":"","cvss_accessvector":"L","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.4","cvss_basevector":"AV:L/AC:M/Au:N/C:P/I:P/A:P","cvss_temporalscore":"3.6","cvss_environmentalscore":"0.9","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.129375,"vulnote":null}