47 results (0.008 seconds)

CVSS: 4.0EPSS: 0%CPEs: 16EXPL: 0

The (1) bin/invscoutClient_VPD_Survey and (2) sbin/invscout_lsvpd programs in invscout.rte before 2.2.0.19 on IBM AIX 7.1, 6.1, 5.3, and earlier allow local users to delete arbitrary files, or trigger inventory scout operations on arbitrary files, via a symlink attack on an unspecified file. El programa (1) bin/invscoutClient_VPD_Survey y (2) sbin/invscout_lsvpd en invscout.rte antes de v2.2.0.19 en IBM AIX v7.1, v6.1, v5.3, y anteriores, permite a usuarios locales borrar archivos de su elección o lanzar las operaciones de exploración de inventario en archivos de su elección, a través de un ataque de enlace simbólico en un archivo no especificado. • http://aix.software.ibm.com/aix/efixes/security/invscout_advisory2.asc http://secunia.com/advisories/47222 http://www-01.ibm.com/support/docview.wss?uid=isg1IV11643 http://www.securityfocus.com/bid/51059 http://www.securityfocus.com/bid/51083 https://exchange.xforce.ibmcloud.com/vulnerabilities/71615 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 10.0EPSS: 7%CPEs: 1EXPL: 7

Buffer overflow in ftpd in IBM AIX 5.3 and earlier allows remote attackers to execute arbitrary code via a long NLST command. Desbordamiento de buffer en ftpd de IBM AIX v5.3 y versiones anteriores. Permite a atacantes remotos ejecutar código de su elección a través de un comando NLST extenso. • https://www.exploit-db.com/exploits/14409 https://www.exploit-db.com/exploits/14456 http://aix.software.ibm.com/aix/efixes/security/ftpd_advisory.asc http://seclists.org/fulldisclosure/2010/Jul/281 http://seclists.org/fulldisclosure/2010/Jul/317 http://seclists.org/fulldisclosure/2010/Jul/324 http://seclists.org/fulldisclosure/2010/Jul/337 http://securitytracker.com/id?1024368 http://www.exploit-db.com/exploits/14409 http://www.exploit-db.com/exploits/14456 http:// • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 22%CPEs: 45EXPL: 1

Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and earlier; IBM VIOS 2.1, 1.5, and earlier; NFS/ONCplus B.11.31_09 and earlier on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote attackers to execute arbitrary code via an RPC request containing format string specifiers in an invalid directory name. Vulnerabilidad de cadena de formato en la función _msgout en rpc.pcnfsd en AIX de IBM versiones 6.1, 5.3 y anteriores; VIOS de IBM versiones 2.1, 1.5 y anteriores; NFS/ONCplus versión B.11.31_09 y anteriores sobre HP-UX de HP versiones B.11.11, B.11.23 y B.11.31; y IRIX de SGI versión 6.5, permiten a los atacantes remotos ejecutar código arbitrario por medio de una petición RPC que contiene especificadores de cadena de formato en un nombre de directorio no comprobado. • https://www.exploit-db.com/exploits/14407 http://aix.software.ibm.com/aix/efixes/security/pcnfsd_advisory.asc http://marc.info/?l=bugtraq&m=127428077629933&w=2 http://osvdb.org/64729 http://secunia.com/advisories/39835 http://secunia.com/advisories/39911 http://securitytracker.com/id?1024016 http://www.checkpoint.com/defense/advisories/public/2010/cpai-13-May.html http://www.ibm.com/support/docview.wss?uid=isg1IZ73590 http://www.ibm.com/support/docview.wss?uid=isg1IZ735 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 6.9EPSS: 0%CPEs: 3EXPL: 2

The Inventory Scout daemon (invscoutd) 1.3.0.0 and 2.0.2 for AIX 4.3.3 and 5.1 allows local users to gain privileges via a symlink attack on a command line argument (log file). NOTE: this might be related to CVE-2006-5002. • https://www.exploit-db.com/exploits/23883 http://secunia.com/advisories/11200 http://www.osvdb.org/4582 http://www.securiteam.com/exploits/5CP0F0UDFG.html http://www.securityfocus.com/bid/9982 http://www.xfocus.org/exploits/200403/31.html https://exchange.xforce.ibmcloud.com/vulnerabilities/15620 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

rexecd for AIX 4.3.3 does not properly use a local copy of the pwd structure when calling getpwnam, which may cause the structure to be overwritten by the authenticate function and assign privileges to the wrong user. • http://secunia.com/advisories/11085 http://www-1.ibm.com/support/docview.wss?uid=isg1IY53507 http://www.ciac.org/ciac/bulletins/o-102.shtml http://www.osvdb.org/4248 http://www.securityfocus.com/bid/9835 https://exchange.xforce.ibmcloud.com/vulnerabilities/15455 •