AIX 7.1 TL 3 : malloc (IV62808)

high Nessus Plugin ID 77266

Synopsis

The remote AIX host is missing a security patch.

Description

It has been identified that the runtime linker allows privilege escalation via arbitrary file writes with elevated privileges programs. When MALLOCOPTIONS and MALLOCBUCKETS environment variables are set with bucket statistics options and by executing certain setuid programs, a non-privileged user may able to create a root owned file with 666 permission.

In AIX6.1 and above, a local user can also exploit this error using the _LIB_INIT_DBG and _LIB_INIT_DBG_FILE environment variables.

Solution

Install the appropriate interim fix. If interim fix IV60940s3a is already installed, it must be removed (via instructions in the advisory) before installing the correct interim fix.

See Also

https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc

Plugin Details

Severity: High

ID: 77266

File Name: aix_IV62808.nasl

Version: 1.9

Type: local

Published: 8/20/2014

Updated: 4/21/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:ibm:aix:7.1

Required KB Items: Host/local_checks_enabled, Host/AIX/version, Host/AIX/lslpp

Exploit Ease: No known exploits are available

Patch Publication Date: 6/30/2014

Vulnerability Publication Date: 6/30/2014

Reference Information

CVE: CVE-2014-3074

BID: 68296