CVE-2005-2236 – AIX 5.2 - 'paginit' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2005-2236
Format string vulnerability in the paginit command in IBM AIX 5.3, and possibly other versions, might allow local users to execute arbitrary code via format strings in command line arguments. • https://www.exploit-db.com/exploits/1046 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0003.txt http://www.securityfocus.com/bid/13911 •
CVE-2005-2233
https://notcve.org/view.php?id=CVE-2005-2233
Buffer overflow in multiple "p" commands in IBM AIX 5.1, 5.2 and 5.3 might allow local users to execute arbitrary code via long command line arguments to (1) penable or other hard-linked files including (2) pdisable, (3) pstart, (4) phold, (5) pdelay, or (6) pshare. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0006.txt http://www.security-focus.com/advisories/8684 http://www.securityfocus.com/bid/13915 •
CVE-2005-2234
https://notcve.org/view.php?id=CVE-2005-2234
Buffer overflow in the getlvname command in IBM AIX 5.1, 5.2 and 5.3, might allow local users to execute arbitrary code via long command line arguments. • http://secunia.com/advisories/15636 http://securitytracker.com/id?1014132 http://www.caughq.org/advisories/CAU-2005-0005.txt http://www.security-focus.com/advisories/8684 http://www.securityfocus.com/bid/13914 •
CVE-2005-1176
https://notcve.org/view.php?id=CVE-2005-1176
Race condition in JFS2 on AIX 5.2 and 5.3, when deleting a file while I/O is still occurring for that file, may write data to a different file, which could leak sensitive information. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY70032&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY70034&apar=only https://exchange.xforce.ibmcloud.com/vulnerabilities/20604 •
CVE-2005-1037
https://notcve.org/view.php?id=CVE-2005-1037
Unknown vulnerability in AIX 5.3.0, when configured as an NIS client, allows remote attackers to gain root privileges. • http://secunia.com/advisories/14856 http://www-1.ibm.com/support/search.wss?rs=0&q=IY68825&apar=only http://www.niscc.gov.uk/niscc/docs/br-20050405-00278.html?lang=en •