AIX 6.1 TL 8 : malloc (IV62803)

High Nessus Plugin ID 77262


The remote AIX host is missing a security patch.


It has been identified that the runtime linker allows privilege escalation via arbitrary file writes with elevated privileges programs. When MALLOCOPTIONS and MALLOCBUCKETS environment variables are set with bucket statistics options and by executing certain setuid programs, a non-privileged user may able to create a root owned file with 666 permission.

In AIX6.1 and above, a local user can also exploit this error using the _LIB_INIT_DBG and _LIB_INIT_DBG_FILE environment variables.


Install the appropriate interim fix. If interim fix IV61311s4a is already installed, it must be removed (via instructions in the advisory) before installing the correct interim fix.

See Also

Plugin Details

Severity: High

ID: 77262

File Name: aix_IV62803.nasl

Version: 1.5

Type: local

Published: 2014/08/20

Modified: 2018/06/29

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:ibm:aix:6.1

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/06/30

Vulnerability Publication Date: 2014/06/30

Reference Information

CVE: CVE-2014-3074

BID: 68296