---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: IBM AIX Multiple Vulnerabilities SECUNIA ADVISORY ID: SA28609 VERIFY ADVISORY: http://secunia.com/advisories/28609/ CRITICAL: Less critical IMPACT: Manipulation of data, Exposure of sensitive information, Privilege escalation WHERE: Local system OPERATING SYSTEM: AIX 5.x http://secunia.com/product/213/ AIX 6.x http://secunia.com/product/16995/ DESCRIPTION: Some vulnerabilities have been reported in IBM AIX, which can be exploited by malicious, local users to disclose potentially sensitive information, manipulate certain files, or gain escalated privileges. 1) A boundary error in the pioout command can be exploited to cause a buffer overflow and execute arbitrary code with root privileges. 2) An unspecified error in the ps command allows users to access potentially sensitive information from an arbitrary process. The vulnerabilities are reported in versions 5.2.0, 5.3.0, 5.3.7, and 6.1.0. 3) Boundary errors in the uspchrp and utape commands can be exploited by users in the 'system' group to cause a buffer overflow and execute arbitrary code with root privileges. The vulnerabilities are reported in versions 5.2.0, 5.3.0, and 5.3.7. 4) Boundary errors in the lchangevg, ldeletepv, putlvodm, lvaryoffvg, lvgenminor, swap, swapoff, and swapon commands can be exploited by users in the 'system' group to cause a buffer overflow and execute arbitrary code with root privileges. 5) The problem is that some of the WebSM Remote Client files are installed with world-writable permissions, which can be exploited to e.g. write to the installed files. The vulnerabilities are reported in version 5.2 and 5.3. SOLUTION: Apply interim fixes or APARs as soon as they become available: ftp://aix.software.ibm.com/aix/efixes/security/pioout_ifix.tar ftp://aix.software.ibm.com/aix/efixes/security/ps_ifix.tar ftp://aix.software.ibm.com/aix/efixes/security/uspchrp_fix.tar ftp://aix.software.ibm.com/aix/efixes/security/utape_fix.tar ftp://aix.software.ibm.com/aix/efixes/security/lvm_ifix.tar ftp://aix.software.ibm.com/aix/efixes/security/websm_linux_fix.tar ftp://aix.software.ibm.com/aix/efixes/security/swap_fix.tar -- APARs -- AIX 5.2.0: IZ10840 (available approximately 05/14/2008) IZ11242 (available approximately 05/14/2008) IZ06261 IZ06260 IZ00559 IZ10828 IY96095 Vulnerability #5 is reportedly fixed in 5.2 TL10. AIX 5.3.0: IZ10841 (available approximately 02/06/2008) IZ12745 (available approximately 04/30/2008) IZ06621 IZ06620 IY98331 IY98340 IY99537 IY97257 IY96101 AIX 5.3.7: IZ10842 (available approximately 02/06/2008) IZ11243 (available approximately 04/30/2008) IZ06489 IZ06488 AIX 6.1.0: IZ10844 (available approximately 02/20/2008) IZ11244 (available approximately 02/20/2008) PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) iDefense Labs 2) Andrea "bunker" Purificato 3-5) Reported by the vendor. ORIGINAL ADVISORY: IBM: http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4078 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4075 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4072 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4070 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4068 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4066 http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4064 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------