IBM AIX Buffer Overflow in qosmod Command Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID: 1023695|
SecurityTracker URL: http://securitytracker.com/id/1023695
(Links to External Site)
Updated: Mar 15 2010|
Original Entry Date: Mar 8 2010
Execution of arbitrary code via local system, User access via local system|
Fix Available: Yes Vendor Confirmed: Yes |
A vulnerability was reported in IBM AIX. A local user can obtain elevated privileges on the target system.|
A local user with 'aix.network.config.no' role-based access control authorization can trigger a buffer overflow in '/usr/sbin/qosmod' to execute arbitrary code on the target system.
The vendor has assigned APARs IZ71870, IZ71627, IZ71555, and IZ68231 to this vulnerability.
A local user can obtain elevated privileges on the target system.|
The vendor has issued efixes, available at:|
The vendor's advisory is available at:
Vendor URL: aix.software.ibm.com/aix/efixes/security/qosmod_advisory.asc (Links to External Site)
Source Message Contents
Date: Mon, 08 Mar 2010 19:46:58 +0000|
Subject: IBM AIX
-----BEGIN PGP SIGNED MESSAGE-----
IBM SECURITY ADVISORY
First Issued: Fri Mar 5 10:04:00 CST 2010
The most recent version of this document is available here:
VULNERABILITY: AIX qosmod buffer overflow vulnerability
PLATFORMS: AIX 6.1
SOLUTION: Apply the fix or workaround as described below.
THREAT: A local authenticated attacker may be able to
gain the privileges of the qosmod command
CERT VU Number: n/a
CVE Number: n/a
Reboot required? NO
Protected by FPM? NO
Protected by SED? YES
There is a buffer overflow vulnerability in the qosmod command. A
locally authenticated attacker can exploit this vulnerability if
they have they have been assigned the aix.network.config.no
role-based access control authorization.
The successful exploitation of this vulnerability allows a local
attacker to execute arbitrary code with the innate privileges of
the qosmod command.
The following executable is vulnerable:
II. PLATFORM VULNERABILITY ASSESSMENT
Note: To use the following commands on VIOS you must first
To determine if your system is vulnerable, execute the following
lslpp -L bos.net.tcp.server
The following fileset levels are vulnerable:
AIX Fileset Lower Level Upper Level
bos.net.tcp.server 06.01.0001.0000 06.01.0001.0007
bos.net.tcp.server 06.01.0002.0000 06.01.0002.0004
bos.net.tcp.server 06.01.0003.0000 06.01.0003.0002
bos.net.tcp.server 06.01.0004.0000 06.01.0004.0001
Fixes are now available. The fixes can be downloaded from:
The links above are to a tar file containing this signed
advisory, fix packages, and PGP signatures for each package.
AIX Level VIOS Level Fix
6.1.2 2.1.0 IZ71627_02.100305.epkg.Z
6.1.3 2.1.1 IZ71555_03.100305.epkg.Z
6.1.4 2.1.2 IZ68231_04.100305.epkg.Z
To extract the fixes from the tar file:
tar xvf qosmod_fix.tar
Verify you have retrieved the fixes intact:
The checksums below were generated using the "csum -h SHA1"
(sha1sum) commands and are as follows:
csum -h SHA1 (sha1sum) filename
To verify the sums, use the text of this advisory as input to
csum or sha1sum. For example:
csum -h SHA1 -i qosmod_advisory.asc
sha1sum -c qosmod_advisory.asc
These sums should match exactly. The PGP signatures in the tar
file and on this advisory can also be used to verify the
integrity of the fixes. If the sums or signatures cannot be
confirmed, contact IBM AIX Security and describe the
discrepancy at the following addresses:
firstname.lastname@example.org (Andy Hazlewood)
B. FIX INSTALLATION
IMPORTANT: If possible, it is recommended that a mksysb backup
of the system be created. Verify it is both bootable and
readable before proceeding.
Fix management documentation can be found at:
To preview fix installation:
emgr -e fix_name -p # where fix_name is the name of the
# fix being previewed.
To install fix package:
emgr -e fix_name -X # where fix_name is the name of the
# fix being installed.
IBM has assigned the following APARs to this problem:
AIX Level APAR number Service pack date
6.1.1 IZ71870 4/21/10 sp8
6.1.2 IZ71627 4/21/10 sp7
6.1.3 IZ71555 4/21/10 sp4
6.1.4 IZ68231 2/5/10 sp3
Subscribe to the APARs here:
By subscribing, you will receive periodic email alerting you
to the status of the APAR, and a link to download the service
pack when it becomes available.
Remove the entry for qosmod from /etc/security/privcmds and update
the kernel security tables by running 'setkst'.
VI. CONTACT INFORMATION
If you would like to receive AIX Security Advisories via email,
and click on the "My notifications" link.
To view previously issued advisories, please visit:
Comments regarding the content of this announcement can be
email@example.com (Andy Hazlewood)
To obtain the PGP public key that can be used to communicate
securely with the AIX Security Team you can either:
A. Send an email with "get key" in the subject line to:
B. Download the key from our web page:
C. Download the key from a PGP Public Key Server. The key ID is:
Please contact your local IBM AIX support center for any
eServer is a trademark of International Business Machines
Corporation. IBM, AIX and pSeries are registered trademarks of
International Business Machines Corporation. All other trademarks
are property of their respective holders.
This vulnerability was reported by IBM.
This advisory was written by Andy Hazlewood (firstname.lastname@example.org).
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (AIX)
-----END PGP SIGNATURE-----