Upgrade to Solaris version 2.6 or higher, as it has been reported to fix this vulnerability.
Sun Microsystems. Inc have released the following suite of patches to address this vulnerability:
Solaris 2.4: 101907-14
Solaris 2.4_x86: 101908-14
Solaris 2.5: 104015-01
Solaris 2.5_x86: 104016-01
Solaris 2.5.1: 104010-01
Solaris 2.5.1_x86: 104011-01
Sites that do not require the vold functionality should remove the complete set of Volume Management packages. These are SUNWvolg, SUNWvolu and SUNWvolr.
These packages can be removed using pkgrm(1M).
Alternatively, to prevent rmmount(1M) creating temporary files, sites must edit the /etc/rmmount.conf file and comment out (or remove) any entry which references action_filemgr.so.
The standard /etc/rmmount.conf contains the following entries which must be commented out (or deleted) to remove this vulnerability:
action cdrom action_filemgr.so
action floppy action_filemgr.so
After applying this workaround, an example of /etc/rmmount.conf may look like:
# @(#)rmmount.conf 1.2 92/09/23 SMI
# Removable Media Mounter configuration file.
# File system identification
ident hsfs ident_hsfs.so cdrom
ident ufs ident_ufs.so cdrom floppy pcmem
ident pcfs ident_pcfs.so floppy pcmem
# Following two lines commented out to remove vold vulnerability
# action cdrom action_filemgr.so
# action floppy action_filemgr.so
Note that vold does not have to be restarted for these changes to take effect.