Page 3 of 48 results (0.016 seconds)

CVSS: 8.5EPSS: 0%CPEs: 3EXPL: 0

CSPOC in IBM PowerHA SystemMirror on AIX 6.1 and 7.1 allows remote authenticated users to perform an "su root" action by leveraging presence on the cluster-wide password-change list. CSPOC en IBM PowerHA SystemMirror en AIX 6.1 y 7.1 permite a usuarios remotos autenticados ejecutar una acción 'su root' aprovechando la presencia en la lista de cambio de contraseñas del clúster. • http://aix.software.ibm.com/aix/efixes/security/powerha_advisory.asc http://www-01.ibm.com/support/docview.wss?uid=isg1IV76943 http://www-01.ibm.com/support/docview.wss?uid=isg1IV76946 http://www-01.ibm.com/support/docview.wss?uid=isg1IV77007 http://www.securityfocus.com/bid/76948 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.9EPSS: 0%CPEs: 7EXPL: 0

netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors. netstat en IBM AIX 5.3, 6.1 y 7.1 y VIOS 2.2.x, cuando se utiliza un adaptador de canal de fibra, permite a usuarios locales obtener privilegios a través de vectores no especificados. • http://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc http://www-01.ibm.com/support/docview.wss?uid=swg1IV75940 http://www-01.ibm.com/support/docview.wss?uid=swg1IV77299 http://www.securitytracker.com/id/1033806 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 1

lquerylv in cmdlvm in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x allows local users to gain privileges via a crafted DBGCMD_LQUERYLV environment-variable value. lquerylv en cmdlvm en IBM AIX 5.3, 6.1, y 7.1 and VIOS 2.2.x permite a usuarios locales ganar privilegios a través de un valor de variable del entorno DBGCMD_LQUERYLV manipulado. • https://www.exploit-db.com/exploits/38576 http://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc http://secunia.com/advisories/62195 http://www.ibm.com/support/docview.wss?uid=isg1IV67907 http://www.ibm.com/support/docview.wss?uid=isg1IV67908 http://www.ibm.com/support/docview.wss?uid=isg1IV68070 http://www.ibm.com/support/docview.wss?uid=isg1IV68082 http://www.ibm.com/support/docview.wss? • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 97%CPEs: 147EXPL: 1

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue. El protocolo SSL 3.0, utilizado en OpenSSL hasta 1.0.1i y otros productos, utiliza relleno (padding) CBC no determinístico, lo que facilita a los atacantes man-in-the-middle obtener datos de texto plano a través de un ataque de relleno (padding) oracle, también conocido como el problema "POODLE". A flaw was found in the way SSL 3.0 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. • https://github.com/mikesplain/CVE-2014-3566-poodle-cookbook ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc http://advisories.mageia.org/MGASA-2014-0416.html http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566 http& • CWE-310: Cryptographic Issues CWE-757: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program. El enlazador en tiempo de ejecución en IBM AIX 6.1 y 7.1 y VIOS 2.2.x permite a usuarios locales crear un fichero propiedad de root modo 666, y como consecuencia ganar privilegios, mediante la configuración de valores variables de entorno MALLOCOPTIONS y MALLOCBUCKETS manipulados y luego la ejecución de un programa setuid. • http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc http://packetstormsecurity.com/files/127390/IBM-AIX-Runtime-Linker-Privilege-Escalation.html http://seclists.org/fulldisclosure/2014/Jul/31 http://secunia.com/advisories/59344 http://www.ibm.com/support/docview.wss?uid=isg1IV60935 http://www.ibm.com/support/docview.wss?uid=isg1IV60940 http://www.ibm.com/support/docview.wss?uid=isg1IV61311 http://www.ibm.com/support/docview.wss?uid=isg1IV61313 http://www.ibm.com/suppo • CWE-264: Permissions, Privileges, and Access Controls •