Lucene search

K
ibmIBMD7B5759D9CB4D2128AD437B99986F25DA48D98F4374982EEA56312F6AD37016C
HistoryMay 06, 2024 - 7:08 p.m.

Security Bulletin: AIX is vulnerable to privilege escalation (CVE-2024-27273)

2024-05-0619:08:02
www.ibm.com
12
aix
privilege escalation
vulnerability
aix 7.2
aix 7.3
vios 3.1
vios 4.1
kernel
security bulletin
patch
fix
apar
ibm
unix domain
socket
implementation

8.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Summary

Vulnerability in the AIX kernel may lead to privilege escalation (CVE-2024-27273).

Vulnerability Details

CVEID:CVE-2024-27273
**DESCRIPTION:**IBM AIX’s Unix domain datagram socket implementation could potentially expose applications using Unix domain datagram sockets with SO_PEERID operation and may lead to privilege escalation.
CVSS Base score: 8.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/284903 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
AIX 7.2
AIX 7.3
VIOS 3.1
VIOS 4.1

The vulnerabilities in the following filesets are being addressed:

Fileset Lower Level Upper Level
bos.mp64 7.2.5.0 7.2.5.107
bos.mp64 7.2.5.200 7.2.5.205
bos.mp64 7.3.0.0 7.3.0.5
bos.mp64 7.3.1.0 7.3.1.4
bos.mp64 7.3.2.0 7.3.2.1

To find out whether the affected filesets are installed on your systems, refer to the lslpp command found in AIX user’s guide.

Example: lslpp -L | grep -i bos.mp64

Remediation/Fixes

A. APARS

IBM has assigned the following APARs to this problem:

AIX Level APAR SP
7.2.5 IJ50910 SP08
7.3.0 IJ50936 N/A
7.3.1 IJ50935 SP04
7.3.2 IJ50934 SP02
VIOS Level APAR FP
3.1.3 N/A
3.1.4 IJ50910 3.1.4.40
4.1.0 IJ50934 4.1.0.20

Subscribe to the APARs here:

<https://www.ibm.com/support/pages/apar/&gt;[APAR Number]

By subscribing, you will receive periodic email alerting you to the status of the APAR, and a link to download the fix once it becomes available.

B. FIXES

IBM strongly recommends addressing the vulnerability now.

AIX and VIOS fixes are available.

An LPAR system reboot is required to complete the iFix installation, or Live Update may be used on AIX 7.2 and 7.3 to avoid a reboot.

The AIX and VIOS fixes can be downloaded via https from:

<https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar&gt;

The link above is to a tar file containing this signed advisory, fix packages, and OpenSSL signatures for each package. The fixes below include prerequisite checking. This will enforce the correct mapping between the fixes and AIX Technology Levels.

AIX Level Interim Fix
7.2.5.5 IJ50910m5a.240502.epkg.Z
7.2.5.6 IJ50910m6a.240502.epkg.Z
7.2.5.7 IJ50910s7a.240418.epkg.Z
7.3.0.2 IJ50936m2a.240502.epkg.Z
7.3.0.3 IJ50936m3a.240502.epkg.Z
7.3.0.4 IJ50936m4a.240502.epkg.Z
7.3.1.1 IJ50935m1a.240502.epkg.Z
7.3.1.2 IJ50935m2a.240502.epkg.Z
7.3.1.3 IJ50935s3a.240418.epkg.Z
7.3.2.1 IJ50934s1a.240418.epkg.Z

Please note that the above table refers to AIX TL/SP level as opposed to fileset level, i.e., 7.2.5.6 is AIX 7200-05-06.

Please reference the Affected Products and Version section above for help with checking installed fileset levels.

VIOS Level Interim Fix
3.1.3.21 IJ50937m2a.240502.epkg.Z
3.1.3.30 IJ50937m3a.240502.epkg.Z
3.1.3.40 IJ50937m4a.240502.epkg.Z
3.1.4.10 IJ50910m5a.240502.epkg.Z
3.1.4.21 IJ50910m6a.240502.epkg.Z
3.1.4.31 IJ50910s7a.240418.epkg.Z
4.1.0.10 IJ50934s1a.240418.epkg.Z

The fixes are cumulative and address previously issued AIX/VIOS kernel security and HIPER bulletins with respect to SP and TL, which includes:

<https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc&gt;

<https://www.ibm.com/support/pages/node/7105282&gt;

<https://www.ibm.com/support/pages/node/6857545&gt;

<https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc&gt;

<https://www.ibm.com/support/pages/node/6847947&gt;

To extract the fixes from the tar file:

tar xvf kernel_fix7.tar

cd kernel_fix7

Verify you have retrieved the fixes intact:

The checksums below were generated using the “openssl dgst -sha256 [filename]” command as the following:

openssl dgst -sha256 filename
20e7f9984bd3f82f0edf2523e039476c35a9b5ee19ce642524205cc078f37df2 IJ50910m5a.240502.epkg.Z
26ada723ea3ecde12c83b04a8f2266d518bbf282a8dcec8972b9947d46b1d341 IJ50910m6a.240502.epkg.Z
6ce0cc7acef1e5cc4f27493e49d7d5687d1b111eaaf1bf161b88a41fe88f022f IJ50910s7a.240418.epkg.Z
e604f15538d68688dadff227c822c01c488884865b9d9a9c3567ce4f098b90ec IJ50934s1a.240418.epkg.Z
f7d5ecde8c0e146c164c65bc77ca3a15144d2132eeba269dd5ecb880a9e94734 IJ50935m1a.240502.epkg.Z
cebad1156c081a9345374db95c8533799fcd7fe1c95f16faeb97f01fddda9946 IJ50935m2a.240502.epkg.Z
fbc7cad5e854772fce7e5cd2426e7c653f6ae2cc9ecff3735c14c63a0c41c96d IJ50935s3a.240418.epkg.Z
953c8c96ed53f202a03c8c044d72e64b8778e6cd4a4e60dcd34ff904dcaa0c99 IJ50936m2a.240502.epkg.Z
c97fb2d06e6efbca162134292e242aa5892c7bc3fbeae72b675ff8b6d4361c4a IJ50936m3a.240502.epkg.Z
691164620d96cb9e353aba78f5a8ca288ab625efca6bc536052b163b1f3c15e1 IJ50936m4a.240502.epkg.Z
06709014779183f1a204228724aa439401b14d13c2a9d55300bf8d91d138754c IJ50937m2a.240502.epkg.Z
bf7e6ee7afdec2fa58662ce973fe4f7903446b20219463174d5bd4b3b031b40b IJ50937m3a.240502.epkg.Z
03d7ad9b0fc0dfad5862060140d1a5b926539c7e91fb9c6b157f2fc83a154ae9 IJ50937m4a.240502.epkg.Z

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmaixMatch7.2
OR
ibmaixMatch7.3
OR
ibmpowervm_virtual_i\/o_serverMatch3.1
OR
ibmpowervm_virtual_i\/o_serverMatch4.1

8.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for D7B5759D9CB4D2128AD437B99986F25DA48D98F4374982EEA56312F6AD37016C