|
|
[ Message Precedent sur la mailing][ Message Suivant sur la mailing][ Precedent dans le fil][ Prochain dans le fil][ Index par Date][ Index par fil]
[SA33915] IBM AIX "at" Command Privilege Escalation Vulnerability
Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?
Click here to learn more:
link://[click]
TITLE:
IBM AIX "at" Command Privilege Escalation Vulnerability
SECUNIA ADVISORY ID:
SA33915
VERIFY ADVISORY:
link://[click]
CRITICAL:
Less critical
IMPACT:
Exposure of sensitive information, Privilege escalation
WHERE:
Local system
OPERATING SYSTEM:
AIX 5.x
link://[click]
AIX 6.x
link://[click]
DESCRIPTION:
A vulnerability has been reported in AIX, which can be exploited by
malicious, local users to perform certain actions with escalated
privileges.
The vulnerability is caused due to the "at" command being setuid root
and not dropping privileges when reading certain files. This can be
exploited to read arbitrary files on the system.
The vulnerability is reported in IBM AIX 5.2, 5.3, and 6.1.
SOLUTION:
Apply fixes or APARs as soon as they become available.
link://[click]
AIX 5.2.0:
IZ43452 (available approximately 7/22/2009)
link://[click]
AIX 5.3.0:
IZ43453 (available approximately 4/29/2009)
link://[click]
AIX 5.3.7:
IZ43454 (available approximately 4/29/2009)
link://[click]
AIX 5.3.8:
IZ43455 (available approximately 4/29/2009)
link://[click]
AIX 5.3.9:
IZ43456 (available approximately 4/29/2009)
link://[click]
AIX 6.1.0:
IZ43457 (available approximately 6/03/2009)
link://[click]
AIX 6.1.1:
IZ43458 (available approximately 6/03/2009)
link://[click]
AIX 6.1.2:
IZ43459 (available approximately 6/03/2009)
link://[click]
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
IBM:
link://[click]
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
link://[click]
Definitions: (Criticality, Where etc.)
link://[click]
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|