Vulnerability Note VU#18419
IBM AIX nslookup fails to drop root privileges
The nslookup command fails to drop privileges, allowing local attackers to gain root privileges.
The nslookup program fails to drop the privileges it gains from being setuid. This access appears to be needed to read the "/etc/resolv.conf" file. This problem was described in IBM ERS advisory ERS-SVA-E01-1997:008.1.
Intruders with access to a local user account may be able to gain root privileges.
Apply a Patch
Disable the setuid bit on nslookup
You can prevent this vulnerability from being exploited by removing the setuid bit from the nslookup program. You can do this by executing the following command as root:
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|IBM||Affected||-||26 Sep 2001|
CVSS Metrics (Learn More)
This document was written by Cory F. Cohen.
- CVE IDs: CVE-1999-0093
- Date Public: 29 Oct 97
- Date First Published: 26 Sep 2001
- Date Last Updated: 27 Sep 2001
- Severity Metric: 2.76
- Document Revision: 10
If you have feedback, comments, or additional information about this vulnerability, please send us email.