CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
8.9 | $0-$5k | 0.00 |
A vulnerability, which was classified as critical, has been found in IBM AIX up to 5.3 L (Operating System). Affected by this issue is an unknown function. The manipulation with an unknown input leads to a memory corruption vulnerability. Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. Impacted is confidentiality, integrity, and availability. CVE summarizes:
Buffer overflow in multiple "p" commands in IBM AIX 5.1, 5.2 and 5.3 might allow local users to execute arbitrary code via long command line arguments to (1) penable or other hard-linked files including (2) pdisable, (3) pstart, (4) phold, (5) pdelay, or (6) pshare.
The issue has been introduced in 05/01/2001. The weakness was published 07/12/2005 (Website). The advisory is shared for download at securityfocus.com. This vulnerability is handled as CVE-2005-2233 since 07/12/2005. The exploitation is known to be easy. The attack needs to be approached locally. No form of authentication is required for exploitation. There are neither technical details nor an exploit publicly available.
The vulnerability was handled as a non-public zero-day exploit for at least 1533 days. During that time the estimated underground price was around $25k-$100k.
Upgrading to version 6.1 eliminates this vulnerability.
Similar entries are available at 25764, 25763, 25762 and 25761.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.3VulDB Meta Temp Score: 8.9
VulDB Base Score: 9.3
VulDB Temp Score: 8.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
ATT&CK: Unknown
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: AIX 6.1
Timeline
05/01/2001 🔍06/09/2005 🔍
06/10/2005 🔍
07/12/2005 🔍
07/12/2005 🔍
07/12/2005 🔍
09/05/2005 🔍
03/11/2015 🔍
01/14/2018 🔍
Sources
Vendor: ibm.comAdvisory: securityfocus.com⛔
Status: Not defined
Confirmation: 🔍
CVE: CVE-2005-2233 (🔍)
SecurityTracker: 1014132
Vulnerability Center: 9070 - IBM AIX Local Buffer Overflow via Penable Command Line Arguments, Medium
SecurityFocus: 13915 - IBM AIX Penable Command Line Argument Local Buffer Overflow Vulnerability
Secunia: 15636 - AIX Multiple Privilege Escalation Vulnerabilities, Less Critical
See also: 🔍
Entry
Created: 03/11/2015 23:39Updated: 01/14/2018 10:30
Changes: 03/11/2015 23:39 (54), 01/14/2018 10:30 (13)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.