Page 9 of 243 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Multiple buffer overflows in unspecified svprint (System V print) commands in bos.svprint.rte in IBM AIX 5.2 and 5.3 allow local users to gain privileges via unspecified vectors. Múltiples desbordamientos de búfer en comandos svprint (System V print) no especificado en bos.svprint.rte en IBM AIX 5.2 y 5.3 permite a usuarios locales ganar privielgios a través de vectores no especificados. • http://osvdb.org/40394 http://secunia.com/advisories/26715 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ02717 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ02718 http://www.securityfocus.com/bid/25561 http://www.vupen.com/english/advisories/2007/3059 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3837 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3838 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in uucp in bos.net.uucp in IBM AIX 5.2 and 5.3 allows local users to gain privileges via unspecified vectors. Desbordamiento de búfer en uucp en bos.net.uucp en IBM AIX 5.2 y 5.3 permite a usuarios locales ganar privilegios a través de vectores no especificados. • http://secunia.com/advisories/26715 http://www-1.ibm.com/support/docview.wss?uid=isg1IY95852 http://www-1.ibm.com/support/docview.wss?uid=isg1IY97215 http://www.securityfocus.com/bid/25563 http://www.vupen.com/english/advisories/2007/3059 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3851 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3852 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0

Multiple buffer overflows in IBM AIX 5.2 and 5.3 allow local users in the system group to gain root privileges via unspecified vectors involving the (1) chpath, (2) rmpath, and (3) devinstall programs in bos.rte.methods. Múltiples desbordamientos de búfer en IBM AIX 5.2 y 5.3 permiten a usuarios locales en el grupo system obtener privilegios de root mediante vectores no especificados involucrando los programas (1) chpath, (2) rmpath, y (3) devinstall en bos.rte.methods. • ftp://aix.software.ibm.com/aix/efixes/security/README http://secunia.com/advisories/26420 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ00531 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ01433 http://www.securityfocus.com/bid/25270 http://www.securitytracker.com/id?1018549 http://www.vupen.com/english/advisories/2007/2860 https://exchange.xforce.ibmcloud.com/vulnerabilities/35971 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in fileplace in bos.perf.tools in IBM AIX 5.2 and 5.3 allows local users to gain privileges via unspecified vectors. Desbordamiento de búfer en fileplace en bos.perf.tools de IBM AIX 5.2 y 5.3 permite a usuarios locales obtener privilegios a través de vectores no especificados. • ftp://aix.software.ibm.com/aix/efixes/security/README http://secunia.com/advisories/26420 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ00149 http://www-1.ibm.com/support/docview.wss?uid=isg1IZ00154 http://www.securityfocus.com/bid/25271 http://www.securitytracker.com/id?1018550 http://www.vupen.com/english/advisories/2007/2860 http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&heading=AIX53&path=%2F200708%2FSECURITY%2F20070810%2Fdatafile101707 https://exchan •

CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0

AIX 5.2 and 5.3 install pioinit with user and group ownership of bin, which allows local users with bin or possibly printq privileges to gain root privileges by modifying pioinit. AIX 5.2 y 5.3 instala pioinit como usuario y grupo bin, lo cual permite a usuario locales con privilegios de bin o posiblemente de printq obtener las credenciales de root modificando el pioinit. • http://osvdb.org/36782 http://secunia.com/advisories/26219 http://securitytracker.com/id?1018468 http://www-1.ibm.com/support/docview.wss?uid=isg1IY79785 http://www-1.ibm.com/support/docview.wss?uid=isg1IY79786 http://www.vupen.com/english/advisories/2007/2678 •