SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   IBM AIX Vendors:   IBM
IBM AIX Buffer Overflows in invscout, paginit, diagTasksWebSM, getlvname, and swcons Commands and Multiple p Commands Let Local Users Execute Arbitrary Code
SecurityTracker Alert ID:  1014132
SecurityTracker URL:  http://securitytracker.com/id/1014132
CVE Reference:   CVE-2005-2232, CVE-2005-2233, CVE-2005-2234, CVE-2005-2235, CVE-2005-2236, CVE-2005-2237   (Links to External Site)
Updated:  Nov 2 2008
Original Entry Date:  Jun 8 2005
Impact:   Execution of arbitrary code via local system, Root access via local system

Version(s): 5.3
Description:   Several vulnerabilities were reported in IBM's AIX operating system, affecting the invscout, paginit, diagTasksWebSM, getlvname, and swcons commands and multiple "p" commands. A local user can obtain elevated privileges.

A local user can supply specially crafted command line parameters to trigger a buffer overflow in the invscout, paginit, diagTasksWebSM, getlvname, and swcons commands and execute arbitrary code, potentially with root privileges.

A local user with system group privileges can trigger buffer overflows in the following "p" commands:

/usr/sbin/penable
/usr/sbin/pdisable
/usr/sbin/pstart
/usr/sbin/phold
/usr/sbin/pdelay
/usr/sbin/pshare

Computer Academic Underground (CAU) reported these vulnerabilities.

The original advisories are available at:

http://www.caughq.org/advisories/CAU-2005-0002.txt
http://www.caughq.org/advisories/CAU-2005-0003.txt
http://www.caughq.org/advisories/CAU-2005-0004.txt
http://www.caughq.org/advisories/CAU-2005-0005.txt
http://www.caughq.org/advisories/CAU-2005-0006.txt
http://www.caughq.org/advisories/CAU-2005-0007.txt

Impact:   A local user can execute arbitrary code with root privileges.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.ibm.com/ (Links to External Site)
Cause:   Boundary error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC