{"vuid":"VU#18500","idnumber":"18500","name":"IBM AIX portmir buffer overflow","keywords":["IBM","AIX","portmir","buffer overflow"],"overview":"There is a buffer overflow vulnerability in the AIX portmir command that may allow local attackers to gain root privileges.","clean_desc":"There is a buffer overflow in the AIX portmir command. This problem was described in IBM ERS security bulletin: ERS-SVA-E01-1997:006.1.","impact":"Attackers with access to a local user account may gain root privileges.","resolution":"Apply a Patch IBM has released patches to correct this problem. For AIX version 4.2.1, system administrators should apply APAR#IX71795.","workarounds":"Disable the setuid bit on the portmir command Disabling the setuid bit on the portmir command will prevent this vulnerability from being exploited. ?You can do this by running the following command as root: chmod u-s /usr/sbin/portmir","sysaffected":"","thanks":"","author":"This document was written by Cory F. Cohen.","public":["http://groups.google.com/groups?q=ERS-SVA-E01-1997:006.1&hl=en&rnum=3&selm=6383eb%24kts%241%40watnews1.watson.ibm.com","http://xforce.iss.net/static/592.php"],"cveids":["CVE-1999-0092"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"1999-01-05T22:28:24Z","publicdate":"1997-10-29T00:00:00Z","datefirstpublished":"2001-09-26T20:22:37Z","dateupdated":"2001-09-27T18:58:11Z","revision":10,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"5","cam_impact":"20","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"4.3125","cam_scorecurrentwidelyknown":"4.3125","cam_scorecurrentwidelyknownexploited":"8.0625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.3125,"vulnote":null}