ibacm is vulnerable to arbitrary file write. It was found that the ibacm daemon created some files with world-writable permissions. A local attacker could use this flaw to overwrite the contents of the ibacm.log or ibacm.port file, allowing them to mask certain actions from the log or cause ibacm to run on a non-default port.
git.openfabrics.org/git?p=~shefty/ibacm.git%3Ba=commit%3Bh=d204fca2b6298d7799e918141ea8e11e7ad43cec
git.openfabrics.org/git?p=~shefty/ibacm.git;a=commit;h=d204fca2b6298d7799e918141ea8e11e7ad43cec
rhn.redhat.com/errata/RHSA-2013-0509.html
www.openwall.com/lists/oss-security/2012/10/11/6
www.openwall.com/lists/oss-security/2012/10/11/9
www.securityfocus.com/bid/55890
access.redhat.com/security/updates/classification/#low
rhn.redhat.com/errata/RHSA-2013-0509.html