There is a an error in the handling of the _LIB_INIT_DBG and _LIB_INIT_DBG_FILE environment variables in a debugging component of the XL C++ runtime library. A local user can exploit this error when executing setuid root programs linked with the XL C++ runtime library, and thereby create arbirtrary, world writeable files owned by root. The successful exploitation of this vulnerability allows a local user to create arbitrary files and execute arbitrary code as the root user. Note that in AIX 6.1 the debugging component moved from libC.a to libc.a. This means that the fix is delivered by updating the XL C++ runtime on AIX 5.3 and earlier, and by updating the bos.rte.libc fileset on AIX 6.1. The following libraries are vulnerable: AIX 5.3 and earlier: /usr/lpp/xlC/lib/libC.a AIX 6.1: /usr/ccs/lib/libc.a /usr/ccs/lib/libp/libc.a
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center