![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-1093
https://notcve.org/view.php?id=CVE-2017-1093
02 Feb 2017 — IBM AIX 6.1, 7.1, and 7.2 could allow a local user to exploit a vulnerability in the bellmail binary to gain root privileges. IBM AIX 6.1, 7.1 y 7.2 podría permitir a un usuario local explotar una vulnerabilidad en el bellmail binario para obtener privilegios de root. • http://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2016-8972 – IBM AIX 6.1/7.1/7.2 - 'Bellmail' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2016-8972
22 Dec 2016 — IBM AIX 6.1, 7.1, and 7.2 could allow a local user to gain root privileges using a specially crafted command within the bellmail client. IBM APARs: IV91006, IV91007, IV91008, IV91010, IV91011. IBM AIX 6.1, 7.1 y 7.2 podría permitir a un usuario local obtener privilegios de root utilizando un comando especialmente manipulado dentro del cliente de bellmail. IBM APARs: IV91006, IV91007, IV91008, IV91010, IV91011. IBM AIX versions 6.1, 7.1, and 7.2 suffer from a Bellmail privilege escalation vulnerability. • https://packetstorm.news/files/id/140256 • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2016-6038
https://notcve.org/view.php?id=CVE-2016-6038
26 Sep 2016 — Directory traversal vulnerability in Eclipse Help in IBM Tivoli Lightweight Infrastructure (aka LWI), as used in AIX 5.3, 6.1, and 7.1, allows remote authenticated users to read arbitrary files via a crafted URL. Vulnerabilidad de salto de directorio en Eclipse Help en IBM Tivoli Lightweight Infrastructure (también conocido como LWI), tal como se utiliza en AIX 5.3, 6.1 y 7.1, permite a usuarios remotos autenticados leer archivos arbitrarios a través de una URL manipulada, • http://aix.software.ibm.com/aix/efixes/security/pconsole_mitigation.asc • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2016-0266
https://notcve.org/view.php?id=CVE-2016-0266
08 Aug 2016 — IBM AIX 5.3, 6.1, 7.1, and 7.2 and VIOS 2.2.x do not default to the latest TLS version, which makes it easier for man-in-the-middle attackers to obtain sensitive information via unspecified vectors. IBM AIX 5.3, 6.1, 7.1 y 7.2 y VIOS 2.2.x no predetermina a la última versión TLS, lo que facilita a atacantes man-in-the-middle obtener información sensible a través de vectores no especificados. • http://www-01.ibm.com/support/docview.wss?uid=swg1IV86116 • CWE-254: 7PK - Security Features •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2016-0281
https://notcve.org/view.php?id=CVE-2016-0281
08 Aug 2016 — The mustendd driver in IBM AIX 5.3, 6.1, 7.1, and 7.2 and VIOS 2.2.x, when the jumbo_frames feature is not enabled, allows remote attackers to cause a denial of service (FC1763 or FC5899 adapter crash) via crafted packets. El controlador mustendd en IBM AIX 5.3, 6.1, 7.1 y 7.2 y VIOS 2.2.x, cuando la característica jumbo_frames no está habilitada, permite a atacantes remotos provocar una denegación de servicio (caída del adaptador FC1763 o FC5899) a través de paquetes manipulados. • http://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2015-5005
https://notcve.org/view.php?id=CVE-2015-5005
08 Nov 2015 — CSPOC in IBM PowerHA SystemMirror on AIX 6.1 and 7.1 allows remote authenticated users to perform an "su root" action by leveraging presence on the cluster-wide password-change list. CSPOC en IBM PowerHA SystemMirror en AIX 6.1 y 7.1 permite a usuarios remotos autenticados ejecutar una acción 'su root' aprovechando la presencia en la lista de cambio de contraseñas del clúster. • http://aix.software.ibm.com/aix/efixes/security/powerha_advisory.asc • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2015-4948
https://notcve.org/view.php?id=CVE-2015-4948
16 Oct 2015 — netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors. netstat en IBM AIX 5.3, 6.1 y 7.1 y VIOS 2.2.x, cuando se utiliza un adaptador de canal de fibra, permite a usuarios locales obtener privilegios a través de vectores no especificados. • http://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-8904 – AIX 7.1 - 'lquerylv' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2014-8904
15 Jan 2015 — lquerylv in cmdlvm in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x allows local users to gain privileges via a crafted DBGCMD_LQUERYLV environment-variable value. lquerylv en cmdlvm en IBM AIX 5.3, 6.1, y 7.1 and VIOS 2.2.x permite a usuarios locales ganar privilegios a través de un valor de variable del entorno DBGCMD_LQUERYLV manipulado. • https://www.exploit-db.com/exploits/38576 • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-3566 – SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack
https://notcve.org/view.php?id=CVE-2014-3566
15 Oct 2014 — The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue. El protocolo SSL 3.0, utilizado en OpenSSL hasta 1.0.1i y otros productos, utiliza relleno (padding) CBC no determinístico, lo que facilita a los atacantes man-in-the-middle obtener datos de texto plano a través de un ataque de relleno (padding) oracle, también conocid... • https://github.com/mikesplain/CVE-2014-3566-poodle-cookbook • CWE-310: Cryptographic Issues CWE-757: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-3074 – IBM AIX Runtime Linker Privilege Escalation
https://notcve.org/view.php?id=CVE-2014-3074
02 Jul 2014 — The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program. El enlazador en tiempo de ejecución en IBM AIX 6.1 y 7.1 y VIOS 2.2.x permite a usuarios locales crear un fichero propiedad de root modo 666, y como consecuencia ganar privilegios, mediante la configuración de valores variables de entorno MALLOCOPT... • http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc • CWE-264: Permissions, Privileges, and Access Controls •