[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-3074Date: (C)2014-07-02   (M)2023-12-22


The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.2
Exploit Score: 3.9
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1030504
http://www.securityfocus.com/archive/1/532689/100/0/threaded
SECUNIA-59344
BID-68296
IV60935
IV60940
IV61311
IV61313
IV61314
IV61315
http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc
http://packetstormsecurity.com/files/127390/IBM-AIX-Runtime-Linker-Privilege-Escalation.html
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-3074/
ibm-aix-cve20143074-priv-escalation(93816)

CPE    2
cpe:/o:ibm:aix:7.1
cpe:/o:ibm:aix:6.1
CWE    1
CWE-264
OVAL    1
oval:org.secpod.oval:def:1100081

© SecPod Technologies