|
|
|
|
| |
Credit:
The information has been provided by iDefense.
The original article can be found at:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=570
|
| |
Vulnerable Systems:
* AIX version 5.3 with service pack 6.
* (Previous versions may also be affected).
The vulnerability exists within the code that parses terminal control sequences. A long series of control sequences will trigger an exploitable stack-based buffer overflow.
Exploitation of this vulnerability results in the execution of arbitrary code with root privileges.
The capture program is setuid root, and executable by any user with local access. The vulnerability is a stack-based buffer overflow, and is trivially exploitable.
Workaround:
Removing the setuid bit from the binary will prevent exploitation, but may make the program unusable by non-root users.
IBM Corp. has addressed this vulnerability by releasing interim fixes. More information can be found via the Bulletins tab of IBM's Subscription Service for UNIX and Linux servers:
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=1
CVE Information:
CVE-2007-3333
Disclosure Timeline:
* 06/05/2007 - Initial vendor notification
* 06/08/2007 - Initial vendor response
* 07/26/2007 - Coordinated public disclosure
|
|
|
|
|