---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: IBM AIX Multiple Privilege Escalation Vulnerabilities SECUNIA ADVISORY ID: SA26219 VERIFY ADVISORY: http://secunia.com/advisories/26219/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: AIX 5.x http://secunia.com/product/213/ DESCRIPTION: Some vulnerabilities have been reported in IBM AIX, which can be exploited by malicious, local users to gain escalated privileges. 1) The vulnerability is caused due to the program loading an arbitrary library. This can be exploited to load an attacker-supplied library and execute arbitrary code with root privileges. 2) A boundary error in the "capture" program can be exploited to cause a stack-based buffer overflow via an overly long, specially crafted series of control sequences. Successful exploitation allows execution of arbitrary code with root privileges. 3) Multiple boundary errors in the "ftp" program can be exploited to cause stack-based buffer overflows and execute arbitrary code with root privileges. 4) A boundary error in the "lpd" command can be exploited to cause a buffer overflow and allow users in the printq group to execute arbitrary code with root privileges. 5) Insecure file permissions on the "pioinit" script can be exploited by users in the bin group to execute arbitrary code with root privileges by replacing the affected script with a malicious one. 6) A boundary error in the "arp" command, which is installed with the devices.common.IBM.atm.rte fileset, can be exploited to cause a buffer overflow and execute arbitrary code with root privileges. The vulnerabilities are reported in versions 5.2.0 and 5.3.0. SOLUTION: Apply interim fixes or APARs as soon as they become available: ftp://aix.software.ibm.com/aix/efixes/security/pioout_ifix.tar.Z ftp://aix.software.ibm.com/aix/efixes/security/capture_ifix.tar.Z ftp://aix.software.ibm.com/aix/efixes/security/ftpgets_ifix.tar.Z ftp://aix.software.ibm.com/aix/efixes/security/lpd_ifix.tar.Z ftp://aix.software.ibm.com/aix/efixes/security/pioinit_ifix.tar.Z ftp://aix.software.ibm.com/aix/efixes/security/atm_ifix.tar.Z AIX 5.2.0: APAR IZ01121 (available approximately 10/31/2007) APAR IZ01134 (available approximately 10/31/2007) APAR IZ01812 (available approximately 10/31/2007) APAR IY98560 (available) APAR IY79785 (available) APAR IZ00521 (available approximately 10/31/2007) AIX 5.3.0: APAR IZ01122 (available approximately 08/08/2007) APAR IZ01135 (available approximately 11/27/2007) APAR IZ01813 (available approximately 11/27/2007) APAR IY98339 (available) APAR IY79786 (available) APAR IZ00510 (available approximately 08/08/2007) PROVIDED AND/OR DISCOVERED BY: 1) Discovered by an anonymous person and reported via iDefense Labs. 2) Discovered by an anonymous person and reported via iDefense Labs. 3) Discovered by an anonymous person and reported via iDefense Labs. 4)-6) Reported by the vendor. ORIGINAL ADVISORY: IBM: ftp://aix.software.ibm.com/aix/efixes/security/README iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=569 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=570 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=571 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------