SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   IBM AIX Vendors:   IBM
IBM AIX lscfg Command May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1015061
SecurityTracker URL:  http://securitytracker.com/id/1015061
CVE Reference:   CVE-2006-0667   (Links to External Site)
Updated:  Feb 14 2006
Original Entry Date:  Oct 14 2005
Impact:   Modification of system information, Modification of user information, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): AIX 5.2, 5.3
Description:   A vulnerability was reported in AIX. A local user may be able to obtain elevated privileges.

The AIX 'lscfg' command creates temporary trace files in an unsafe manner. A local user can create a symbolic link (symlink) from a critical file on the system to a temporary file to be used by the lscfg command. Then, when the command is run by the target user, the symlinked file will be modified with the privileges of the target user.

This may allow the allow the user to corrupt system files or potentially obtain root privileges on the target system.

Impact:   A local user can corrupt system files and may be able to gain root privileges on the target system.
Solution:   The vendor has issued a fix (APAR IY77624), described at:

http://www-1.ibm.com/support/docview.wss?uid=isg1IY77624

Vendor URL:  www-1.ibm.com/support/docview.wss?uid=isg1IY77624 (Links to External Site)
Cause:   Access control error, State error

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 14 2006 (IBM Issues Fix for AIX 5.3) IBM AIX lscfg Command May Let Local Users Gain Elevated Privileges
IBM has issued a fix for AIX 5.3 (in addition to the previously issued fix for AIX 5.2).



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC