Rapid7 Vulnerability & Exploit Database

AIX 5.3.0 - kernel_advisory : AIX_kernel_multiple_security_vulnerabilities (IZ17111)

Back to Search

AIX 5.3.0 - kernel_advisory : AIX_kernel_multiple_security_vulnerabilities (IZ17111)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
03/11/2008
Created
07/25/2018
Added
10/02/2014
Modified
10/02/2014

Description

There are multiple vulnerabilities in the AIX kernel: a) A 64-bit process that is restarted via the checkpoint and restart feature will gain read and write access to certain areas of kernel memory, resulting in execution of arbitrary code. Track with the following APAR numbers: IZ16992, IZ17111, IZ11820, IZ12794. b) Remote nodes of a concurrent volume group may crash after a single node reduces the size of a JFS2 filesystem residing on the concurrent volume group, resulting in a denial of service. Track with the following APAR numbers: IZ05246, IZ04953, IZ04946. c) The proc filesystem does not enforce directory access controls correctly when the permission on a directory is more restrictive than permission on the currently executing file in that directory, resulting in information leakage. Track with the following APAR numbers: IZ06022, IZ06663, IZ06505. d) Trusted Execution fails to protect files when the modifications are made via hard links. Affects AIX 6.1 only. Track with the following APAR number: IZ13418 e) Some WPAR specific system calls may cause undefined behavior, possibly resulting in a denial of service. Affects AIX 6.1 only. Track with the following APAR numbers: IZ13392, IZ13346 f) A user with enough privileges to run ProbeVue can read from any kernel memory address, resulting in information leakage. Affects AIX 6.1 only. Track with the following APAR number: IZ09545 The following files are vulnerable: /usr/lib/boot/unix_64 /usr/lib/boot/unix_mp /usr/lib/boot/unix_up /usr/lib/drivers/hd_pin /usr/sbin/lreducelv The fixes below include the fixes for all of the above APARs.

Solution(s)

  • aix-5.3.0-aix_kernel_multiple_security_vulnerabilities_kernel_advisory

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;