Page 3 of 163 results (0.009 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

16 Sep 2010 — Unspecified vulnerability in sa_snap in the bos.esagent fileset in IBM AIX 5.3 allows local users to leverage system group membership and delete files via unknown vectors. Vulnerabilidad no especificada en sa_snap en el conjunto de archivos bos.esagent en IBM AIX v5.3 permite a usuarios locales aprovechar pertenencia al grupo y eliminar archivos a través de vectores desconocidos. • http://aix.software.ibm.com/aix/efixes/security/sa_snap_advisory.asc •

CVSS: 10.0EPSS: 79%CPEs: 1EXPL: 7

30 Aug 2010 — Buffer overflow in ftpd in IBM AIX 5.3 and earlier allows remote attackers to execute arbitrary code via a long NLST command. Desbordamiento de buffer en ftpd de IBM AIX v5.3 y versiones anteriores. Permite a atacantes remotos ejecutar código de su elección a través de un comando NLST extenso. • https://www.exploit-db.com/exploits/14409 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 26%CPEs: 45EXPL: 1

20 May 2010 — Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and earlier; IBM VIOS 2.1, 1.5, and earlier; NFS/ONCplus B.11.31_09 and earlier on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote attackers to execute arbitrary code via an RPC request containing format string specifiers in an invalid directory name. Vulnerabilidad de cadena de formato en la función _msgout en rpc.pcnfsd en AIX de IBM versiones 6.1, 5.3 y anteriores; VIOS de IBM versiones 2.1, 1.5 ... • https://www.exploit-db.com/exploits/14407 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

26 Mar 2010 — bos.rte.libc 5.3.9.4 on IBM AIX 5.3 does not properly support reading a certain address field after a successful getaddrinfo function call, which allows context-dependent attackers to cause a denial of service (application crash) via unspecified vectors, as demonstrated by IBM DB2 crashes on "systems with databases cataloged with alternate servers using IP addresses." bos.rte.libc v5.3.9.4 en IBM AIX v5.3 no soporta de forma adecuada la lectura de ciertos campos de dirección después de una llamada incirrect... • http://www-01.ibm.com/support/docview.wss?uid=isg1IZ66710 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

03 Mar 2010 — Unspecified vulnerability in secldapclntd in IBM AIX 5.3 with SP 5300-11-02 allows attackers to cause a denial of service (LDAP login failure) via unknown vectors. NOTE: some of these details are obtained from third party information. NOTE: there may be no attacker role, and the issue may be triggered entirely by an administrator's installation of an official service pack. Vulnerabilidad no especificada en secldapclntd en IBM AIX 5.3 con SP 5300-11-02 permite a atacantes remotos provocar una denegación de s... • ftp://public.dhe.ibm.com/aix/efixes/iz69977/README.txt •

CVSS: 10.0EPSS: 70%CPEs: 31EXPL: 2

15 Oct 2009 — Stack-based buffer overflow in libcsa.a (aka the calendar daemon library) in IBM AIX 5.x through 5.3.10 and 6.x through 6.1.3, and VIOS 2.1 and earlier, allows remote attackers to execute arbitrary code via a long XDR string in the first argument to procedure 21 of rpc.cmsd. Desbordamiento de búfer basado en pila en libcsa.a (también conocido como biblioteca del demonio calendario (calendar daemon library)) en IBM AIX v5.x hasta v5.3.10 y v6.x hasta v6.1.3, y VIOS v2.1 y versiones anteriores, permite a atac... • https://www.exploit-db.com/exploits/16929 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

01 Oct 2009 — gssd in IBM AIX 5.3.x through 5.3.9 and 6.1.0 through 6.1.2 does not properly handle the NFSv4 Kerberos credential cache, which allows local users to bypass intended access restrictions for Kerberized NFSv4 shares via unspecified vectors. gssd en IBM AIX v5.3.x hasta v5.3.9 y v6.1.0 hasta v6.1.2 no maneja adecuadamente las credenciales de caché NFSv4 Kerberos, lo que permite a atacantes locales eludir las restricciones de acceso para el recurso compartido "Kerberized NFSv4" a través de vectores no especific... • http://aix.software.ibm.com/aix/efixes/security/nfs4_advisory.asc • CWE-255: Credentials Management Errors •

CVSS: 10.0EPSS: 2%CPEs: 7EXPL: 0

01 Oct 2009 — nfs.ext in IBM AIX 5.3.x through 5.3.9 and 6.1.0 through 6.1.2 does not properly use the nfs_portmon setting, which allows remote attackers to bypass intended access restrictions for NFSv4 shares via unspecified vectors. nfs.ext en IBM AIX v5.3.x hasta v5.3.9 y v6.1.0 hasta v6.1.2 no usa apropiadamente la configuración nfs_portmon, lo que permite a atacantes remotos eludir las restricciones de acceso para NFSv4 compartidos a través de vectores no especificados. • http://aix.software.ibm.com/aix/efixes/security/nfs4_advisory.asc •

CVSS: 9.8EPSS: 75%CPEs: 16EXPL: 2

10 Aug 2009 — Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII string to remote procedure 15. Desbordamiento de búfer basado en pila en la función _tt_internal_realpath en la biblioteca ToolTalk (libtt.a) en IBM AIX v5.2.0, v5.3.0, v5.3.7 a la v5.3.10, y v6.1.0 ... • https://www.exploit-db.com/exploits/16930 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

05 Aug 2009 — A certain debugging component in IBM AIX 5.3 and 6.1 does not properly handle the (1) _LIB_INIT_DBG and (2) _LIB_INIT_DBG_FILE environment variables, which allows local users to gain privileges by leveraging a setuid-root program to create an arbitrary root-owned file with world-writable permissions, related to libC.a (aka the XL C++ runtime library) in AIX 5.3 and libc.a in AIX 6.1. Cierto componente de depuración en IBM AIX v5.3 y v6.1 no proporciona la gestión de los entornos (1) _LIB_INIT_DBG y (2) _LIB... • https://www.exploit-db.com/exploits/9645 • CWE-264: Permissions, Privileges, and Access Controls •