Page 6 of 111 results (0.012 seconds)

CVSS: 6.6EPSS: 0%CPEs: 2EXPL: 0

sysmgt.websm.webaccess in IBM AIX 5.2 and 5.3 has world writable permissions for unspecified WebSM Remote Client files, which allows local users to "alter the behavior of" this client by overwriting these files. sysmgt.websm.webaccess en IBM AIX 5.2 y 5.3 tiene permisos de escritura para ficheros no espedificados del cliente remoto WebSM, lo cual permite a usuarios locales "cambiar el comportamiento" de este cliente sobrescribiendo esos ficheros. • http://secunia.com/advisories/28609 http://www.ibm.com/support/docview.wss?uid=isg1IY97257 http://www.securityfocus.com/bid/27433 http://www.vupen.com/english/advisories/2008/0261 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4066 https://exchange.xforce.ibmcloud.com/vulnerabilities/39906 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 1

Buffer overflow in the pioout program in printers.rte in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via a long command line option. Desbordamiento de búfer en el programa pioout de printers.rte en IBM AIX 5.2, 5.3, y 6.1 permite a usuarios locales obtener privilegios mediante una opción larga de línea de comando. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=648 http://secunia.com/advisories/28609 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10840 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10841 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10842 http://www-1.ibm.com/support/docview.wss? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0

cfgcon in IBM AIX 5.2 and 5.3 does not properly validate the argument to the "-p" option to swcons, which allows local users in the system group to create an arbitrary file, and enable world writability of this file, via a symlink attack involving use of the file's name as the argument. NOTE: this issue is due to an incomplete fix for CVE-2007-5804. cfgcon de IBM AIX 5.2 and 5.3 no valida apropiadamente el argumento de la opción "-p" en swcons, lo cual permite a usuarios locales en el grupo del sistema crear un fichero de su elección, y habilitar la escritura de todos en este fichero, a través de un enlace simbólico involucrando el uso del nombre del fichero como argumento. NOTA: este asunto se debe a un parche incompleto para CVE-2007-5804. • ftp://aix.software.ibm.com/aix/efixes/security/cfgcon_ifix.tar http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=611 http://secunia.com/advisories/27437 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ03055 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ03061 http://www.securityfocus.com/bid/26258 http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&heading=AIX53&path=%2F200710%2FSECURITY%2F20071030%2Fdatafile100405 https://exchange.xforce.ibmcloud. • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0

cfgcon in IBM AIX 5.2 and 5.3 does not properly validate the argument to the "-p" option to swcons, which allows local users in the system group to create or overwrite an arbitrary file, and enable world writability of this file, by using the file's name as the argument. cfgcon en IBM AIX 5.2 y 5.3 no valida adecuadamente el argumento de la opción "-p" a swcons, lo cual permite a usuarios locales del grupo sysmtem crear o sobrescribir ficheros de su elección, y habilitar el fichero para escritura para todo el mundo, utilizando el nombre de fichero como argumento. • ftp://aix.software.ibm.com/aix/efixes/security/cfgcon_ifix.tar http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=611 http://secunia.com/advisories/27437 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ03055 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ03061 http://www.securityfocus.com/bid/26258 http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&heading=AIX53&path=%2F200710%2FSECURITY%2F20071030%2Fdatafile100405 https://exchange.xforce.ibmcloud. •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Stack-based buffer overflow in the sendrmt function in bellmail in IBM AIX 5.2 and 5.3 allows local users to execute arbitrary code via a long parameter to the m command. Desbordamiento de búfer basado en pila en la función sendrmt en bellmail de IBM AIX 5.2 y 5.3 permite a usuarios locales ejecutar código de su elección a través de un parámetro largo en el comando m. • ftp://aix.software.ibm.com/aix/efixes/security/bellmail_ifix.tar http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=617 http://secunia.com/advisories/27437 http://securitytracker.com/id?1018871 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ05065 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ05066 http://www.securityfocus.com/bid/26257 http://www.vupen.com/english/advisories/2007/3669 http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •