7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
0.4%
There is a buffer overflow in the digest command that may allow a local attacker to gain root privileges.
The digest command is intended to be run by the qdaemon to generate a binary version of the queue configuration daemon information stored in /etc/qconfig. The digest program has a buffer overflow in one of the filename arguments to the command. An exploit for this vulnerability is publicly available, and is reported to have been used by intruders to compromise systems.
An attacker with access to a local user account may be able to gain root privileges. The attacker must gain access to the printq group before being able to exploit this vulnerability.
Apply a Patch
IBM has released patches to correct this problem. For AIX version 4.2, system adminstrators should apply APAR#IY08287. For AIX version 4.3, system administrators should apply APAR#IY08143. The patches for this problem also correct a vulnerability in the enq command.
808633
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: September 28, 2001
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23808633 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This document was written by Cory F. Cohen.
CVE IDs: | CVE-2000-1120 |
---|---|
Severity Metric: | 5.36 Date Public: |
techsupport.services.ibm.com/rs6000/aix.uhuic_getrec?args=DVhuron.boulder.ibm.com+DBAIX+DA137627+STIY08287+USbin
techsupport.services.ibm.com/rs6000/aix.uhuic_getrec?args=DVhuron.boulder.ibm.com+DBAIX+DA139925+STIY08143+USbin
techsupport.services.ibm.com/support/rs6000.support/fixsearch?fixdb=aix4&srchtype=apar&query=IY08143
techsupport.services.ibm.com/support/rs6000.support/fixsearch?fixdb=aix4&srchtype=apar&query=IY08287
www.rs6000.ibm.com/idd500/usr/share/man/info/en_US/a_doc_lib/cmds/aixcmds2/digest.htm#A26P05a6
www.securityfocus.com/bid/2033
xforce.iss.net/static/5620.php