7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
5.2%
The nslookup command fails to drop privileges, allowing local attackers to gain root privileges.
The nslookup program fails to drop the privileges it gains from being setuid. This access appears to be needed to read the β/etc/resolv.confβ file. This problem was described in IBM ERS advisory ERS-SVA-E01-1997:008.1.
Intruders with access to a local user account may be able to gain root privileges.
**Apply a Patch
**For AIX version 4.1, system administrators should apply APAR #IX71464. For AIX version 4.2, system administrators should apply APAR #IX70815.
Disable the setuid bit on nslookup
You can prevent this vulnerability from being exploited by removing the setuid bit from the nslookup program. You can do this by executing the following command as root:
chmod 555 /usr/bin/nslookup
18419
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: September 26, 2001
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%2318419 Feedback>).
Group | Score | Vector |
---|---|---|
Base | N/A | N/A |
Temporal | N/A | N/A |
Environmental | N/A |
This document was written by Cory F. Cohen.
CVE IDs: | CVE-1999-0093 |
---|---|
Severity Metric: | 2.76 Date Public: |