The IBM AIX errpt command is prone to a locally exploitable buffer overflow condition. It is possible to exploit this condition to execute arbitrary attacker-supplied instructions with root privileges.
# FileName: x_errpt_aix5.pl
# Exploit command errpt for Aix5L to get a root shell.
# Tested : on Aix5.1
# Author : firstname.lastname@example.org
# Site : www.xfocus.org www.xfocus.net
# Date : 2003-4-16
# Announce: use as your owner risk!
#shellcode from lsd-pl and modified by watercloud 2003-4 for Aix5L
A local overflow exists in IBM AIX. The errpt command fails to validate input to the -T argument properly resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code as root resulting in a loss of integrity.
Upgrade to version 4.3.3 (APAR IY31997), 5.1.0 (APAR IY31320), or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.