{"vuid":"VU#18419","idnumber":"18419","name":"IBM AIX nslookup fails to drop root privileges","keywords":["IBM","AIX","nslookup","setuid","root"],"overview":"The nslookup command fails to drop privileges, allowing local attackers to gain root privileges.","clean_desc":"The nslookup program fails to drop the privileges it gains from being setuid. This access appears to be needed to read the \"/etc/resolv.conf\" file. This problem was described in IBM ERS advisory ERS-SVA-E01-1997:008.1.","impact":"Intruders with access to a local user account may be able to gain root privileges.","resolution":"Apply a Patch For AIX version 4.1, system administrators should apply APAR #IX71464. For AIX version 4.2, system administrators should apply APAR #IX70815.","workarounds":"Disable the setuid bit on nslookup You can prevent this vul","sysaffected":"","thanks":"","author":"This document was written by Cory F. Cohen.","public":["http://xforce.iss.net/static/604.php","http://groups.google.com/groups?q=ERS-SVA-E01-1997:008.1&hl=en&rnum=3&selm=6383r7%24kts%243%40watnews1.watson.ibm.com"],"cveids":["CVE-1999-0093"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2020-05-21T16:12:16.774686Z","publicdate":"1997-10-29T00:00:00Z","datefirstpublished":"2001-09-26T16:04:36Z","dateupdated":"2001-09-27T19:00:00Z","revision":10,"vrda_d1_directreport":null,"vrda_d1_population":null,"vrda_d1_impact":null,"cam_widelyknown":null,"cam_exploitation":null,"cam_internetinfrastructure":null,"cam_population":null,"cam_impact":null,"cam_easeofexploitation":null,"cam_attackeraccessrequired":null,"cam_scorecurrent":null,"cam_scorecurrentwidelyknown":null,"cam_scorecurrentwidelyknownexploited":null,"ipprotocol":null,"cvss_accessvector":null,"cvss_accesscomplexity":null,"cvss_authentication":null,"cvss_confidentialityimpact":null,"cvss_integrityimpact":null,"cvss_availabilityimpact":null,"cvss_exploitablity":null,"cvss_remediationlevel":null,"cvss_reportconfidence":null,"cvss_collateraldamagepotential":null,"cvss_targetdistribution":null,"cvss_securityrequirementscr":null,"cvss_securityrequirementsir":null,"cvss_securityrequirementsar":null,"cvss_basescore":"N/A","cvss_basevector":"N/A","cvss_temporalscore":"N/A","cvss_environmentalscore":"N/A","cvss_environmentalvector":"N/A","metric":2.75625,"vulnote":null}