Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   OS (UNIX)  >   IBM AIX Vendors:   IBM
IBM AIX Buffer Overflow in errpt Command May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1020084
SecurityTracker URL:
CVE Reference:   CVE-2008-2514   (Links to External Site)
Updated:  Jun 3 2008
Original Entry Date:  May 22 2008
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.2, 5.3, 6.1
Description:   A vulnerability was reported in AIX. A local user can obtain root privileges on the target system.

A local user can trigger a buffer overflow to execute arbitrary code on the target system with root privileges.

The vulnerability resides in '/usr/bin/errpt', which is configured with set user id (setuid) root privileges.

Impact:   A local user can obtain root privileges on the target system.
Solution:   The vendor has issued the following APAR:

5.2.0 IZ19905

The vendor plans to issue the following APARs on June 20, 2008:

5.3.0 IZ22346
5.3.7 IZ22347
5.3.8 IZ21494
6.1.0 IZ22348

Efixes are available at:

The vendor's advisories are available at:

Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  

Message History:   None.

 Source Message Contents

Date:  Wed, 21 May 2008 20:01:07 -0400
Subject:  IBM AIX

Hash: SHA1


First Issued: Wed May 21 11:18:21 CDT 2008
                           VULNERABILITY SUMMARY

VULNERABILITY:      AIX errpt buffer overflow

PLATFORMS:          AIX 5.2, 5.3, 6.1

SOLUTION:           Apply the fix or workaround as described below.

THREAT:             A local attacker may execute arbitrary code.

CVE Number:         n/a

Reboot required?    NO
Workarounds?        YES
Protected by FPM?   YES (high, medium, or low)
Protected by SED?   YES
                           DETAILED INFORMATION


    The errpt command contains a buffer which can overflow.  A local
    attacker may exploit this overflow to execute arbitrary code with
    root privileges because the command is setuid root.

    The following files are vulnerable:



    To determine if your system is vulnerable, execute the following

    lslpp -L bos.sysmgt.serv_aid

    The following fileset levels are vulnerable:

    AIX Fileset                Lower Level    Upper Level


    A. APARS

        IBM has assigned the following APARs to this problem:

        AIX Level           APAR number        Availability
        5.2.0               IZ19905            Now
        5.3.0               IZ22346            6/20/2008
        5.3.7               IZ22347            6/20/2008
        5.3.8               IZ21494            6/20/2008
        6.1.0               IZ22348            6/20/2008

        Subscribe to the APARs here:

        By subscribing, you will receive periodic email alerting you
        to the status of the APAR, and a link to download the fix once
        it becomes available.

    B. FIXES

        Fixes are available.  The fixes can be downloaded from:

        The links above are to a tar file containing this signed
        advisory, fix packages, and PGP signatures for each package.
        The fixes below include prerequisite checking. This will
        enforce the correct mapping between the fixes and AIX
        Technology Levels.

        AIX Level          Fix (*.U) and Interim Fix (*.Z)
        5.2.0 TL8          IZ19905_08.080514.epkg.Z
        5.2.0 TL9          IZ19905_09.080514.epkg.Z
        5.2.0 TL10         IZ19905_10.080514.epkg.Z
        5.3.0 TL5          IZ22346_05.080514.epkg.Z
        5.3.0 TL6          IZ22346_06.080514.epkg.Z
        5.3.7              IZ22347_07.080514.epkg.Z
        5.3.8              IZ21494_08.080514.epkg.Z
        6.1.0              IZ22348_00.080514.epkg.Z

        To extract the fixes from the tar file:

        tar xvf errpt_fix.tar
        cd errpt_fix

        Verify you have retrieved the fixes intact:

        The checksums below were generated using the "sum", "cksum",
        "csum -h MD5" (md5sum), and "csum -h SHA1" (sha1sum) commands
        and are as follows:

        sum         filename
        20662    70 IZ19905_08.080514.epkg.Z
        49871    70 IZ19905_09.080514.epkg.Z
        65249    70 IZ19905_10.080514.epkg.Z
        20402    77 IZ21494_08.080514.epkg.Z
        38539    71 IZ22346_05.080514.epkg.Z
        58208    71 IZ22346_06.080514.epkg.Z
        36061    71 IZ22347_07.080514.epkg.Z
        42508    80 IZ22348_00.080514.epkg.Z

        cksum            filename
        3882518034 70837 IZ19905_08.080514.epkg.Z
        2140254126 70873 IZ19905_09.080514.epkg.Z
        2999649633 70855 IZ19905_10.080514.epkg.Z
        136921164  77935 IZ21494_08.080514.epkg.Z
        4041292547 71831 IZ22346_05.080514.epkg.Z
        2261779182 72003 IZ22346_06.080514.epkg.Z
        2782459181 71977 IZ22347_07.080514.epkg.Z
        136691478  81601 IZ22348_00.080514.epkg.Z

        csum -h MD5 (md5sum)              filename
        ddb6f834e7ac261eec0d050692f9a4f9  IZ19905_08.080514.epkg.Z
        7d731e832f34a85dedbaab6944259ff7  IZ19905_09.080514.epkg.Z
        b3c95dec7d77e4f6ece81a460b9081c0  IZ19905_10.080514.epkg.Z
        9097e598765864e037316d73af642213  IZ21494_08.080514.epkg.Z
        6a47bcff98bfc9967a90506d7a84c751  IZ22346_05.080514.epkg.Z
        14530192116bcff8244d159dcd9486aa  IZ22346_06.080514.epkg.Z
        cfb851756c0a0321030a702bd2438ae5  IZ22347_07.080514.epkg.Z
        2f3242a35b5ee025981fb323d03fd7f2  IZ22348_00.080514.epkg.Z

        csum -h SHA1 (sha1sum)                    filename
        ed9af41242cab4940e16eaa1f93edcab296d14b0  IZ19905_08.080514.epkg.Z
        fbdb43efe35323bfc22285ff3d8345fa29825e38  IZ19905_09.080514.epkg.Z
        0346358cd53a06c04bae68e7176db59bdeb89650  IZ19905_10.080514.epkg.Z
        a2f4c58a14f85ac29a4afc39e722b6174dbc25ac  IZ21494_08.080514.epkg.Z
        20cdd46d425cc37939eb8ceb317db67d3b0aaa27  IZ22346_05.080514.epkg.Z
        22735d834ffdd299ddbd727611519483ca6ea810  IZ22346_06.080514.epkg.Z
        a9b5d036d93a2a4ec32856485ef4240b3562f3e4  IZ22347_07.080514.epkg.Z
        a8a174860f1fc411f641ba6d1fea575e118e2cbb  IZ22348_00.080514.epkg.Z

        To verify the sums, use the text of this advisory as input to
        csum, md5sum, or sha1sum. For example:

        csum -h SHA1 -i Advisory.asc
        md5sum -c Advisory.asc
        sha1sum -c Advisory.asc

        These sums should match exactly. The PGP signatures in the tar
        file and on this advisory can also be used to verify the
        integrity of the fixes.  If the sums or signatures cannot be
        confirmed, contact IBM AIX Security at and describe the discrepancy.


        IMPORTANT: If possible, it is recommended that a mksysb backup
        of the system be created.  Verify it is both bootable and
        readable before proceeding.

        To preview a fix installation:

        installp -a -d fix_name -p all  # where fix_name is the name of the
                                        # fix package being previewed.
        To install a fix package:

        installp -a -d fix_name -X all  # where fix_name is the name of the  
                                        # fix package being installed.

        Interim fixes have had limited functional and regression
        testing but not the full regression testing that takes place
        for Service Packs; thus, IBM does not warrant the fully
        correct functionality of an interim fix.

        Interim fix management documentation can be found at:

        To preview an interim fix installation:

        emgr -e ipkg_name -p         # where ipkg_name is the name of the  
                                     # interim fix package being previewed.

        To install an interim fix package:

        emgr -e ipkg_name -X         # where ipkg_name is the name of the  
                                     # interim fix package being installed.


    There are two workarounds available.

    A. OPTION 1

        Change the permissions of these commands to remove the setuid
        bit using the following commands:

        chmod 500 /usr/bin/errpt

        NOTE: chmod will disable functionality of these commands for
        all users except root.

    B. OPTION 2 (AIX 6.1, AIX 5.3 TL6 and TL7)

        Use the File Permissions Manager (fpm) command to manage
        setuid and setgid programs.

        fpm documentation can be found in the AIX 6 Security Redbook

        An fpm level of high, medium, or low will remove the setuid
        bit from the affected commands.  For example:

        fpm -l high -p    # to preview changes
        fpm -l high       # to execute changes

        NOTE: Please review the documentation before execution.  fpm
        will disable functionality of multiple commands for all users
        except root.


    AIX security fixes can be downloaded from:

    AIX fixes can be downloaded from:

    NOTE: Affected customers are urged to upgrade to the latest
    applicable Technology Level and Service Pack.


    If you would like to receive AIX Security Advisories via email,
    please visit:
    Comments regarding the content of this announcement can be
    directed to:

    To request the PGP public key that can be used to communicate
    securely with the AIX Security Team you can either:

        A. Send an email with "get key" in the subject line to:


        B. Download the key from a PGP Public Key Server. The key ID is:


    Please contact your local IBM AIX support center for any

    eServer is a trademark of International Business Machines
    Corporation.  IBM, AIX and pSeries are registered trademarks of
    International Business Machines Corporation.  All other trademarks
    are property of their respective holders.


    IBM discovered and fixed this vulnerability as part of its
    commitment to secure the AIX operating system.

Version: GnuPG v1.4.7 (AIX)


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2015, LLC