AIX 7.1 TL 1 : malloc (IV62806)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Synopsis :

The remote AIX host is missing a security patch.

Description :

It has been identified that the runtime linker allows privilege
escalation via arbitrary file writes with elevated privileges
programs. When MALLOCOPTIONS and MALLOCBUCKETS environment variables
are set with bucket statistics options and by executing certain setuid
programs, a non-privileged user may able to create a root owned file
with 666 permission.

In AIX6.1 and above, a local user can also exploit this error using
the _LIB_INIT_DBG and _LIB_INIT_DBG_FILE environment variables.

See also :

Solution :

Install the appropriate interim fix. If interim fix IV61315s9a is
already installed, it must be removed (via instructions in the
advisory) before installing the correct interim fix.

Risk factor :

High / CVSS Base Score : 7.2

Family: AIX Local Security Checks

Nessus Plugin ID: 77264 ()

Bugtraq ID:

CVE ID: CVE-2014-3074

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now