exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

NSFOCUS Security Advisory 2006.2

NSFOCUS Security Advisory 2006.2
Posted Apr 28, 2006
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory (SA2006-02): IBM AIX mklvcopy Local Privilege Escalation Vulnerability

tags | advisory, local
systems | aix
SHA-256 | 62545be78e2bdd657ef035511e3d0d122ea36c621b5faa8bea8ca547dd698287

NSFOCUS Security Advisory 2006.2

Change Mirror Download
NSFOCUS Security Advisory (SA2006-02)

IBM AIX mklvcopy Local Privilege Escalation Vulnerability

Release Date: 2006-04-24

CVE ID: CVE-2006-1246

http://www.nsfocus.com/english/homepage/research/0602.htm

Affected systems & software
===================
IBM AIX 5.3

Unaffected systems & software
===================

Summary
=========

NSFocus Security Team discovered a local privilege escalation vulnerability
in IBM AIX mklvcopy which allows users of local system group to gain root
privilege.

Description
============

The mklvcopy shipped with IBM AIX 5.3 is used to increase the number of copies
in each logical partition in LogicalVolume. By default mklvcopy is set with
suid root bit, and can be run by system group users.

mklvcopy contains a vulnerability when calling external commands, which allows
a local attacker to execute arbitrary command as root. Successful exploitation
requires the attacker should gain system group privilege first.

Workaround
=============

Remove suid root bit from mklvocpy.

# chmod a-s /usr/sbin/mklvcopy

Vendor Status
==============

The vendor has released Patch APAR IY82739 to fix the vulnerability. The related
link is:
http://www-1.ibm.com/support/docview.wss?uid=isg1IY82739

AIX 5 APAR Patch can be downloaded at:
http://www.ibm.com/servers/eserver/support/unixservers/aixfixes.html

The temporary patch for the vulnerability can be downloaded at:
ftp://aix.software.ibm.com/aix/efixes/security/mklvcopy_ifix.tar.Z

Additional Information
========================

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2006-1246 to this issue. This is a candidate for inclusion in the
CVE list (http://cve.mitre.org), which standardizes names for security problems.
Candidates may change significantly before they become official CVE entries.

Acknowledgment
===============

Yang Jilong of NSFocus Security Team found the vulnerability.

DISCLAIMS
==========
THE INFORMATION PROVIDED IS RELEASED BY NSFOCUS "AS IS" WITHOUT WARRANTY
OF ANY KIND. NSFOCUS DISCLAIMS ALL WARRANTIES, EITHER EXPRESSED OR IMPLIED,
EXCEPT FOR THE WARRANTIES OF MERCHANTABILITY. IN NO EVENT SHALL NSFOCUS
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL,CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF NSFOCUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
DISTRIBUTION OR REPRODUCTION OF THE INFORMATION IS PROVIDED THAT THE
ADVISORY IS NOT MODIFIED IN ANY WAY.

Copyright 1999-2006 NSFOCUS. All Rights Reserved. Terms of use.


NSFOCUS Security Team <security@nsfocus.com>
NSFOCUS INFORMATION TECHNOLOGY CO.,LTD
(http://www.nsfocus.com)

PGP Key: http://www.nsfocus.com/homepage/research/pgpkey.asc
Key fingerprint = F8F2 F5D1 EF74 E08C 02FE 1B90 D7BF 7877 C6A6 F6DA
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close