CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
8.3 | $0-$5k | 0.00 |
A vulnerability was found in IBM AIX 5.2/5.3/6.1 (Operating System). It has been rated as critical. This issue affects an unknown function of the component ps. The manipulation with an unknown input leads to a memory corruption vulnerability. Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Buffer overflow in the pioout program in printers.rte in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via a long command line option.
The issue has been introduced in 10/01/2002. The weakness was presented 01/24/2008 by Andrea Purificato (iDefense) with iDEFENSE Labs (Website). It is possible to read the advisory at www14.software.ibm.com. The identification of this vulnerability is CVE-2007-5764 since 10/31/2007. The attack needs to approached within the local network. No form of authentication is needed for a successful exploitation. The technical details are unknown and an exploit is not publicly available.
It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 1940 days. During that time the estimated underground price was around $25k-$100k. The vulnerability scanner Nessus provides a plugin with the ID 31008 (AIX 5.3 TL 7 : printers.rte (U815841)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family AIX Local Security Checks and running in the context l.
Upgrading eliminates this vulnerability. A possible mitigation has been published before and not just after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (39912) and Tenable (31008). See 3566, 3562, 3564 and 3565 for similar entries.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.6VulDB Meta Temp Score: 8.3
VulDB Base Score: 9.6
VulDB Temp Score: 8.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
ATT&CK: Unknown
Local: No
Remote: Partially
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 31008
Nessus Name: AIX 5.3 TL 7 : printers.rte (U815841)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Nessus Port: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
10/01/2002 🔍10/31/2007 🔍
01/22/2008 🔍
01/23/2008 🔍
01/24/2008 🔍
01/24/2008 🔍
01/24/2008 🔍
02/01/2008 🔍
02/12/2008 🔍
07/13/2010 🔍
04/27/2019 🔍
Sources
Vendor: ibm.comAdvisory: www14.software.ibm.com
Researcher: Andrea Purificato (iDefense)
Organization: iDEFENSE Labs
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2007-5764 (🔍)
OVAL: 🔍
X-Force: 39912 - IBM AIX pioout command buffer overflow, High Risk
SecurityTracker: 1019264
SecurityFocus: 27428 - IBM AIX 'pioout' Local Buffer Overflow Vulnerability
Secunia: 28609 - IBM AIX Multiple Vulnerabilities, Less Critical
OSVDB: 66254 - IBM AIX printers.rte pioout Unspecified Command-Line Option Overflow
Vupen: ADV-2008-0261
See also: 🔍
Entry
Created: 02/01/2008 13:51Updated: 04/27/2019 16:31
Changes: 02/01/2008 13:51 (85), 04/27/2019 16:31 (7)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.