SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   IBM AIX Vendors:   IBM
IBM AIX System Startup Script Flaws Let Local Users Modify System Data or Cause Denial of Service Conditions
SecurityTracker Alert ID:  1012419
SecurityTracker URL:  http://securitytracker.com/id/1012419
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 3 2004
Impact:   Denial of service via local system, Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): AIX 5.1, 5.2, and 5.3
Description:   A vulnerability was reported in IBM AIX in some system startup scripts. A local user may be able to inject arbitrary data into the Object Data Manager (ODM) or cause the system to crash.

The vendor reported that some system startup scripts that are included in the base AIX installation allow a local user to modify the ODM or to cause the system to hang when rebooting.

Impact:   A local user can modify the target system's Object Data Manager.

A local user can cause the target system to hang when it is rebooted.

Solution:   The vendor has provided the following fixes:

APAR number for AIX 5.1.0: IY59207 (available)
APAR number for AIX 5.2.0: IY59206 (available)
APAR number for AIX 5.3.0: IY59205 (available)

The APARs are available at:

http://www-912.ibm.com/eserver/support/fixes/fcgui.jsp

Vendor URL:  www.ibm.com/ (Links to External Site)
Cause:   Not specified

Message History:   None.


 Source Message Contents

Subject:  Technical Support Bulletin


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

IBM SECURITY ADVISORY

First Issued: Tue Nov  9 15:45:24 CST 2004

===========================================================================
                           VULNERABILITY SUMMARY

VULNERABILITY:      Data injection and denial of service vulnerabilities in
                    system startup scripts

PLATFORMS:          AIX 5.1, 5.2 and 5.3.

SOLUTION:           Apply the APARs as described below.

THREAT:             A local attacker may inject arbitrary data into the ODM
                    A local attacker may cause a denial of service

CERT VU Number:     N/A
CVE Number:         N/A
===========================================================================
                           DETAILED INFORMATION


I.  Description
===============

Vulnerabilities in system startup scripts allow a local attacker to inject
arbitrary data into the ODM or cause a denial of service. In the case of
the denial of service vulnerability, the machine will hang during boot. To
successfully exploit these vulnerabilities, an attacker must wait for the
machine to be rebooted.

The scripts affected by these vulnerabilities are included in the base AIX
installation.


II. Impact
==========
A local attacker may inject arbitrary data into the ODM.
A local attacker may cause a denial of service.

Since the machine can only be rebooted by a privileged user, these
vulnerabilities are not immediately exploitable by an attacker. This in
turn lowers the severity of these issues.


III.  Solutions
===============

A. Official Fix

IBM provides the following fixes:

      APAR number for AIX 5.1.0: IY59207 (available)
      APAR number for AIX 5.2.0: IY59206 (available)
      APAR number for AIX 5.3.0: IY59205 (available)

NOTE: Affected customers are urged to upgrade to 5.1.0, 5.2.0 or 5.3.0 at
the latest maintenance level.


IV. Obtaining Fixes
===================

AIX Version 5 APARs can be downloaded from the eServer pSeries Fix Central
web site:

     http://www-912.ibm.com/eserver/support/fixes/fcgui.jsp


V.  Contact Information
========================

If you would like to receive AIX Security Advisories via email, please visit:
     https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs

Comments regarding the content of this announcement can be directed to:

     security-alert@austin.ibm.com

To request the PGP public key that can be used to communicate securely
with the AIX Security Team send email to security-alert@austin.ibm.com
with a subject of "get key". The key can also be downloaded from a
PGP Public Key Server. The key id is 0x3AE561C3.

Please contact your local IBM AIX support center for any assistance.

eServer is a trademark of International Business Machines Corporation.
IBM, AIX and pSeries are registered trademarks of International Business
Machines Corporation. All other trademarks are property of their
respective holders.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (MingW32)

iD8DBQFBr9pZ+0ah+jrlYcMRAkjeAKCQD0QdaEniZw9TXQoSjKfxsuJWHQCgu5mC
GE2Qhk75s5jQOvswH4II/L8=
=hTjs
-----END PGP SIGNATURE-----
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC