There is a buffer overflow vulnerability in the AIX portmir command that may allow local attackers to gain root privileges.
There is a buffer overflow in the AIX portmir command. This problem was described in IBM ERS security bulletin: ERS-SVA-E01-1997:006.1.
Attackers with access to a local user account may gain root privileges.
Apply a Patch
Disable the setuid bit on the portmir command
Disabling the setuid bit on the portmir command will prevent this vulnerability from being exploited. ?You can do this by running the following command as root:
This document was written by Cory F. Cohen.
|Date First Published:||2001-09-26|
|Date Last Updated:||2001-09-27 18:58 UTC|