SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   IBM AIX Vendors:   IBM
IBM AIX Kernel Bugs Let Local Users Execute Arbitrary Code, Access Data, and Deny Service
SecurityTracker Alert ID:  1019606
SecurityTracker URL:  http://securitytracker.com/id/1019606
CVE Reference:   CVE-2008-1593, CVE-2008-1594, CVE-2008-1595, CVE-2008-1596, CVE-2008-1597, CVE-2008-1598   (Links to External Site)
Updated:  Apr 1 2008
Original Entry Date:  Mar 12 2008
Impact:   Denial of service via local system, Execution of arbitrary code via local system, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.2, 5.3, 6.1
Description:   Several vulnerabilities were reported in the IBM AIX kernel. A local user can obtain elevated privileges on the target system. A local user can cause denial of service conditions.

A local 64-bit process that is restarted via the checkpoint and restart feature can gain read and write access to certain portions of kernel memory. A local user can exploit this to execute arbitrary code with kernel-level privileges.

A user on a remote node of a concurrent volume group can reduce the size of a JFS2 filesystem residing on the concurrent volume group can cause a remote node to crash.

When the permission on a directory on a proc filesystem is more restrictive than the permission on an executing file in that directory, directory access controls are not properly enforced.

When a user make modifications via hard links, Trusted Execution does not properly protect files. This vulnerability only affects AIX 6.1.

A local user can invoke some WPAR specific system calls to cause denial of service conditions. This vulnerability only affects AIX 6.1.

A local user with privileges to run ProbeVue can read arbitrary kernel memory locations. This vulnerability only affects AIX 6.1. The following files are affected:

/usr/lib/boot/unix_64
/usr/lib/boot/unix_mp
/usr/lib/boot/unix_up
/usr/lib/drivers/hd_pin
/usr/sbin/lreducelv

IBM discovered these vulnerabilities.

Impact:   A local user can obtain elevated privileges on the target system.

A local user can cause denial of service conditions on the target system.

Solution:   The vendor has issued the following fixes.

For 5.2.0: APAR IZ16992
For 5.3.0: APAR IZ17111 (to be available 3/17/2008)
For 5.3.7: APAR IZ11820 (to be available 3/17/2008)
For 6.1.0: APAR IZ12794

The vendor advisories are available at:

http://www.ibm.com/support/docview.wss?uid=isg1IZ16992
http://www.ibm.com/support/docview.wss?uid=isg1IZ17111
http://www.ibm.com/support/docview.wss?uid=isg1IZ11820
http://www.ibm.com/support/docview.wss?uid=isg1IZ12794

Vendor URL:  www.ibm.com/ (Links to External Site)
Cause:   Access control error, Exception handling error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC