Page 4 of 126 results (0.022 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in iostat in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via unknown vectors related to an "environment variable handling error." Una vulnerabilidad no especificada en iostat en IBM AIX versiones 5.2, 5.3 y 6.1 permite a los usuarios locales alcanzar privilegios por medio de vectores desconocidos relacionados con un "environment variable handling error." • http://aix.software.ibm.com/aix/efixes/security/iostat_advisory.asc http://secunia.com/advisories/30349 http://securitytracker.com/id?1020085 http://www.ibm.com/support/docview.wss?uid=isg1IZ20635 http://www.ibm.com/support/docview.wss?uid=isg1IZ21506 http://www.ibm.com/support/docview.wss?uid=isg1IZ22349 http://www.ibm.com/support/docview.wss? • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Stack-based buffer overflow in the reboot program on IBM AIX 5.2 and 5.3 allows local users in the shutdown group to gain privileges. Desbordamiento de búfer basado en pila en el programa de reinicio de IBM AIX 5.2 y 5.3 permite a usuarios locales obtener privilegios en el grupo shutdown (apagado). • http://secunia.com/advisories/29347 http://securitytracker.com/id?1019602 http://www.ibm.com/support/docview.wss?uid=isg1IZ15479 http://www.ibm.com/support/docview.wss?uid=isg1IZ15480 http://www.vupen.com/english/advisories/2008/0865 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4162 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

The nddstat programs on IBM AIX 5.2, 5.3, and 6.1 do not properly handle environment variables, which allows local users to gain privileges by invoking (1) atmstat, (2) entstat, (3) fddistat, (4) hdlcstat, or (5) tokstat. Los programas nddstat de IBM AIX 5.2, 5.3 y 6.1 no manipulan adecuadamente variables de entorno, lo que permite a usuarios locales obtener privilegios invocando (1) atmstat, (2) entstat, (3) fddistat, (4) hdlcstat, o (5) tokstat. • http://securitytracker.com/id?1019604 http://www.ibm.com/support/docview.wss?uid=isg1IZ16975 http://www.ibm.com/support/docview.wss?uid=isg1IZ16991 http://www.ibm.com/support/docview.wss?uid=isg1IZ17058 http://www.ibm.com/support/docview.wss? • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

The checkpoint and restart feature in the kernel in IBM AIX 5.2, 5.3, and 6.1 does not properly protect kernel memory, which allows local users to read and modify portions of memory and gain privileges via unspecified vectors involving a restart of a 64-bit process, probably related to the as_getadsp64 function. La característica de checkpoint (punto de comprobación) y restart (reinicio) en el kernel de IBM AIX 5.2, 5.3 y 6.1 no protege adecuadamente la memoria del kernel, lo que permite a usuarios locales leer y modificar porciones de memoria y obtener privilegios a través de vectores no especificados que implican un reinicio de un proceso de 64 bits, probablemente relacionado con la función as_getadsp64. • http://securitytracker.com/id?1019606 http://www.ibm.com/support/docview.wss?uid=isg1IZ11820 http://www.ibm.com/support/docview.wss?uid=isg1IZ12794 http://www.ibm.com/support/docview.wss?uid=isg1IZ16992 http://www.ibm.com/support/docview.wss? • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Trusted Execution in IBM AIX 6.1 uses an incorrect pathname argument in a call to the trustchk_block_write function, which might allow local users to modify trusted files, related to missing checks in the TSD_FILES_LOCK policy for modifications performed via hard links, a different vulnerability than CVE-2007-6680. Trusted Execution en IBM AIX 6.1 utiliza un argumento de nombre de ruta incorrecto en una llamada a la función trustchk_block_write, lo que podría permitir a usuarios locales modificar archivos de confianza, relacionados con falta de comprobaciones en la política TSD_FILES_LOCK para modificaciones llevada a cabo mediante enlaces duros (hard links), un vector distinto a CVE-2007-6680. • http://securitytracker.com/id?1019606 http://www.ibm.com/support/docview.wss?uid=isg1IZ13418 http://www.securityfocus.com/bid/28467 http://www.vupen.com/english/advisories/2008/0865 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4153 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd? • CWE-264: Permissions, Privileges, and Access Controls •