| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| (1) acledit and (2) aclput in AIX 4.3 allow local users to create or modify files via a symlink attack. |
| Vulnerability in digest in AIX 4.3 allows printq users to gain root privileges by creating and/or modifing any file on the system. |
| The default configuration for UUCP in AIX before 3.2 allows local users to gain root privileges. |
| Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program. |
| inetd in AIX 4.1.5 dynamically assigns a port N when starting ttdbserver (ToolTalk server), but also inadvertently listens on port N-1 without passing control to ttdbserver, which allows remote attackers to cause a denial of service via a large number of connections to port N-1, which are not properly closed by inetd. |
| named-xfer in AIX 4.1.5 and 4.2.1 allows members of the system group to overwrite system files to gain root access via the -f parameter and a malformed zone file. |
| genfilt in the AIX Packet Filtering Module does not properly filter traffic to destination ports greater than 32767. |
| Denial of service in BIND named via naptr. |
| Denial of service in BIND named via malformed SIG records. |
| Buffer overflow in AIX ftpd in the libc library. |
| Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler. |
| Denial of service in AIX ptrace system call allows local users to crash the system. |
| Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges. |
| Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. |
| The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. |
| The rwho/rwhod service is running, which exposes machine status and user information. |
| The rexd service is running, which uses weak authentication that can allow an attacker to execute commands. |
| An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities. |
| rpc.ypupdated (NIS) allows remote users to execute arbitrary commands. |
| The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access. |