|
|
|
|
| |
Credit:
The information has been provided by iDefense Labs.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=648
|
| |
Vulnerable Systems:
* AIX version 5.2 and 5.3
The vulnerability exists due to insufficient input validation when copying user-supplied data to a fixed-size buffer. By passing a long string as a command line option, an attacker can cause an exploitable buffer overflow.
Analysis:
Exploitation of this vulnerability results in the execution of arbitrary code with root privileges. In order to exploit this vulnerability, an attacker must have access to execute the set-uid root 'pioout' program.
Workaround:
Removing the set-uid bit from the binary will prevent exploitation, but will also make the program unusable by non-root users.
Vendor response:
IBM Corp. has addressed this vulnerability by releasing interim fixes. More information can be found via the Bulletins tab of IBM's Subscription Service for UNIX and Linux servers. You can reach this service by clicking the URL shown below.
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=1
CVE Information:
CVE-2007-5764
Disclosure timeline:
11/29/2007 - Initial vendor notification
12/03/2007 - Initial vendor response
01/23/2008 - Coordinated public disclosure
|
|
|
|
|