CVE-2008-1593
 
Severity Score
7.2
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The checkpoint and restart feature in the kernel in IBM AIX 5.2, 5.3, and 6.1 does not properly protect kernel memory, which allows local users to read and modify portions of memory and gain privileges via unspecified vectors involving a restart of a 64-bit process, probably related to the as_getadsp64 function.
La característica de checkpoint (punto de comprobación) y restart (reinicio) en el kernel de IBM AIX 5.2, 5.3 y 6.1 no protege adecuadamente la memoria del kernel, lo que permite a usuarios locales leer y modificar porciones de memoria y obtener privilegios a través de vectores no especificados que implican un reinicio de un proceso de 64 bits, probablemente relacionado con la función as_getadsp64.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-03-31 CVE Reserved
- 2008-03-31 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1019606 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/0865 | Vdb Entry | |
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4153 | X_refsource_confirm | |
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154 | X_refsource_confirm | |
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155 | X_refsource_confirm | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4595 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/28467 | 2017-09-29 |
URL | Date | SRC |
---|---|---|
http://www.ibm.com/support/docview.wss?uid=isg1IZ11820 | 2017-09-29 | |
http://www.ibm.com/support/docview.wss?uid=isg1IZ12794 | 2017-09-29 | |
http://www.ibm.com/support/docview.wss?uid=isg1IZ16992 | 2017-09-29 | |
http://www.ibm.com/support/docview.wss?uid=isg1IZ17111 | 2017-09-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ibm Search vendor "Ibm" | Aix Search vendor "Ibm" for product "Aix" | 5.2 Search vendor "Ibm" for product "Aix" and version "5.2" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Aix Search vendor "Ibm" for product "Aix" | 5.3 Search vendor "Ibm" for product "Aix" and version "5.3" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Aix Search vendor "Ibm" for product "Aix" | 6.1 Search vendor "Ibm" for product "Aix" and version "6.1" | - |
Affected
|