fkie_cve-2014-3074
Vulnerability from fkie_nvd
Published
2014-07-02 10:35
Modified
2024-11-21 02:07
Severity ?
Summary
The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program.
References
psirt@us.ibm.comhttp://aix.software.ibm.com/aix/efixes/security/malloc_advisory.ascVendor Advisory
psirt@us.ibm.comhttp://packetstormsecurity.com/files/127390/IBM-AIX-Runtime-Linker-Privilege-Escalation.html
psirt@us.ibm.comhttp://seclists.org/fulldisclosure/2014/Jul/31
psirt@us.ibm.comhttp://secunia.com/advisories/59344
psirt@us.ibm.comhttp://www.ibm.com/support/docview.wss?uid=isg1IV60935Vendor Advisory
psirt@us.ibm.comhttp://www.ibm.com/support/docview.wss?uid=isg1IV60940Vendor Advisory
psirt@us.ibm.comhttp://www.ibm.com/support/docview.wss?uid=isg1IV61311Vendor Advisory
psirt@us.ibm.comhttp://www.ibm.com/support/docview.wss?uid=isg1IV61313Vendor Advisory
psirt@us.ibm.comhttp://www.ibm.com/support/docview.wss?uid=isg1IV61314Vendor Advisory
psirt@us.ibm.comhttp://www.ibm.com/support/docview.wss?uid=isg1IV61315Vendor Advisory
psirt@us.ibm.comhttp://www.securityfocus.com/archive/1/532689/100/0/threaded
psirt@us.ibm.comhttp://www.securityfocus.com/bid/68296
psirt@us.ibm.comhttp://www.securitytracker.com/id/1030504
psirt@us.ibm.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/93816
psirt@us.ibm.comhttps://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-3074/
af854a3a-2127-422b-91ae-364da2661108http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.ascVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/127390/IBM-AIX-Runtime-Linker-Privilege-Escalation.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2014/Jul/31
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59344
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IV60935Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IV60940Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IV61311Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IV61313Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IV61314Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IV61315Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/532689/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/68296
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1030504
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/93816
af854a3a-2127-422b-91ae-364da2661108https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-3074/
Impacted products
Vendor Product Version
ibm vios 2.2.0.10
ibm vios 2.2.0.11
ibm vios 2.2.0.12
ibm vios 2.2.0.13
ibm vios 2.2.1.0
ibm vios 2.2.1.1
ibm vios 2.2.1.3
ibm vios 2.2.1.4
ibm vios 2.2.1.4
ibm vios 2.2.1.8
ibm vios 2.2.1.9
ibm vios 2.2.2.0
ibm vios 2.2.2.4
ibm vios 2.2.2.5
ibm vios 2.2.3.0
ibm vios 2.2.3.2
ibm vios 2.2.3.3
ibm aix 6.1
ibm aix 7.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17C77E3-ABCE-4F1F-A55D-DB61A2A5E28F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "89B876D5-7095-4BA2-9EE3-3F0632BC2E77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "918D00A4-5502-4DD6-A079-807AB3E964B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A38E8EAD-0742-41CB-B69E-DCC483CBC485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E3BE5C-5097-4585-AF0D-79661DC4A231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "953723A1-606F-4976-A843-1A3F020B9B53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F70EC32-7365-4653-8843-84C92EE9EC68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFABBD01-0773-4823-ABBA-95181558C88E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.1.4:fp-25_sp-02:*:*:*:*:*:*",
              "matchCriteriaId": "4BBC4752-37F3-4AB9-9EFA-D52D65AECC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C762024B-5792-43A3-A82F-A1C0F152F7BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "20C26A6C-3C2E-4A2B-B201-6EE949368EDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB6DD83-F8B5-4286-879C-EDD35F5C7FDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "683595A9-7C48-455D-91E7-BF7E1F5B4BF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AFDC7F-23C2-4925-9356-944CBEBB1E7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE446DB7-3B45-461A-A8E7-5DAFAD8AE5D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA02D40A-7BC3-42C4-8CEF-C992A3EECE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "35AB63E6-D66C-4F69-8C76-5BB56B0D6A18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD518B94-9CD7-4C45-8766-578CF427B4CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0402E20C-8B41-4A2A-BFF9-92EC843985F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program."
    },
    {
      "lang": "es",
      "value": "El enlazador en tiempo de ejecuci\u00f3n en IBM AIX 6.1 y 7.1 y VIOS 2.2.x permite a usuarios locales crear un fichero propiedad de root modo 666, y como consecuencia ganar privilegios, mediante la configuraci\u00f3n de valores variables de entorno MALLOCOPTIONS y MALLOCBUCKETS manipulados y luego la ejecuci\u00f3n de un programa setuid."
    }
  ],
  "id": "CVE-2014-3074",
  "lastModified": "2024-11-21T02:07:25.080",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-07-02T10:35:25.453",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://packetstormsecurity.com/files/127390/IBM-AIX-Runtime-Linker-Privilege-Escalation.html"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://seclists.org/fulldisclosure/2014/Jul/31"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://secunia.com/advisories/59344"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV60935"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV60940"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV61311"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV61313"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV61314"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV61315"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securityfocus.com/archive/1/532689/100/0/threaded"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securityfocus.com/bid/68296"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "http://www.securitytracker.com/id/1030504"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93816"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-3074/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/127390/IBM-AIX-Runtime-Linker-Privilege-Escalation.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2014/Jul/31"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59344"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV60935"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV60940"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV61311"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV61313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV61314"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV61315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/532689/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/68296"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1030504"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93816"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-3074/"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.