CVE-2005-0250
CVSS7.2
发布时间 :2005-05-02 00:00:00
修订时间 :2008-09-05 16:45:45
NMCOS    

[原文]Format string vulnerability in auditselect on IBM AIX 5.1, 5.2, and 5.3 allows local users to execute arbitrary code via format string specifiers in a command line argument.


[CNNVD]IBM AIX AuditSelect本地格式化字符串漏洞(CNNVD-200505-565)

        IBM AIX 5.1、5.2和5.3版本中的auditselect存在格式化字符串漏洞,本地用户可以通过在命令行参数中的格式化字符串限定符来执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:ibm:aix:5.1IBM AIX 5.1
cpe:/o:ibm:aix:5.2IBM AIX 5.2
cpe:/o:ibm:aix:5.3IBM AIX 5.3

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0250
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0250
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-565
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/896729
(VENDOR_ADVISORY)  CERT-VN  VU#896729
http://www.securityfocus.com/bid/12496
(PATCH)  BID  12496
http://www.idefense.com/application/poi/display?id=193&type=vulnerabilities&flashstatus=false
(VENDOR_ADVISORY)  IDEFENSE  20050208 IBM AIX auditselect Local Format String Vulnerability
http://xforce.iss.net/xforce/xfdb/19255
(UNKNOWN)  XF  aix-auditselect-format-string(19255)
http://www-1.ibm.com/support/docview.wss?uid=isg1IY67802
(VENDOR_ADVISORY)  AIXAPAR  IY67802
http://www-1.ibm.com/support/docview.wss?uid=isg1IY67519
(VENDOR_ADVISORY)  AIXAPAR  IY67519
http://www-1.ibm.com/support/docview.wss?uid=isg1IY67472
(VENDOR_ADVISORY)  AIXAPAR  IY67472
http://secunia.com/advisories/14198
(VENDOR_ADVISORY)  SECUNIA  14198
http://securitytracker.com/id?1013103
(UNKNOWN)  SECTRACK  1013103

- 漏洞信息

IBM AIX AuditSelect本地格式化字符串漏洞
高危 格式化字符串
2005-05-02 00:00:00 2005-10-20 00:00:00
本地  
        IBM AIX 5.1、5.2和5.3版本中的auditselect存在格式化字符串漏洞,本地用户可以通过在命令行参数中的格式化字符串限定符来执行任意代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        IBM AIX 5.1
        IBM IY67802
        http://www-1.ibm.com/servers/eserver/support/pseries/aixfixes.html
        
        IBM AIX 5.2
        IBM IY67472
        http://www-1.ibm.com/servers/eserver/support/pseries/aixfixes.html
        
        IBM AIX 5.3
        IBM IY67519
        http://www-1.ibm.com/servers/eserver/support/pseries/aixfixes.html

- 漏洞信息

13638
IBM AIX auditselect Format String Local Privilege Escalation
Local / Remote, Context Dependent Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

- 时间线

2005-02-08 Unknow
Unknow 2005-03-23

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, IBM has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

IBM AIX AuditSelect Local Format String Vulnerability
Input Validation Error 12496
No Yes
2005-02-09 12:00:00 2009-07-12 10:06:00
iDEFENSE Labs is credited with the discovery of this issue.

- 受影响的程序版本

IBM AIX 5.3
IBM AIX 5.2
IBM AIX 5.1

- 漏洞讨论

A local format string vulnerability affects IBM AIX auditselect. This issue is due to a failure of the application to securely implement a formatted printing function.

An attacker may leverage this issue to execute arbitrary code with superuser privileges, ultimately facilitating privilege escalation.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

IBM has made an advisory available dealing with this issue; APAR fixes are pending release. Please see the referenced advisory for more information.


IBM AIX 5.1

IBM AIX 5.2

IBM AIX 5.3

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站