Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
IBM AIX Buffer Overflows in chpath, rmpath, and devinstall Commands Let Local Users Gain Root Privileges
SecurityTracker Alert ID: 1018549|
SecurityTracker URL: http://securitytracker.com/id/1018549
(Links to External Site)
Updated: Aug 15 2007|
Original Entry Date: Aug 10 2007
Execution of arbitrary code via local system, Root access via local system|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 5.2, 5.3|
A vulnerability was reported in AIX. A local user can obtain elevated privileges on the target system.|
A local user with system group privileges can invoke several configuration commands to trigger a buffer overflow and execute arbitrary code on the target system with root privileges.
The chpath, rmpath, and devinstall commands are affected.
IBM discovered this vulnerability.
A local user with system group privileges can obtain root privileges on the target system.|
The vendor has issued the following APARs.|
For 5.2.0: IZ00531
For 5.3.0: IZ01433
Vendor URL: www.ibm.com/ (Links to External Site)
Source Message Contents
Date: Fri, 10 Aug 2007 15:29:38 -0400|
Subject: IBM AIX
-----BEGIN PGP SIGNED MESSAGE-----
IBM SECURITY ADVISORY
First Issued: Tue Aug 7 13:54:01 CDT 2007
VULNERABILITY: AIX multiple buffer overflow vulnerabilities in configuration
PLATFORMS: AIX 5.2 & 5.3
SOLUTION: Apply the APAR, interim fix or workaround as described
THREAT: An attacker may run arbitrary code as root privileges.
CERT VU Number: n/a
CVE Number: n/a
The chpath command either changes the operational status of paths to
the specified device (the -l Name flag) or it changes one, or more,
attributes associated with a specific path to the specified device.
The rmpath command deconfigures, and possibly undefines, one or more
paths associated with the specified target device (-l Name).
The devinstall command installs software support for devices.
The above commands are vulnerable to buffer overflow conditions and may
allow a user in the system group to execute arbitrary code with root
A user in the system group may execute arbitrary code with root privileges.
IV. PLATFORM VULNERABILITY ASSESSMENT
To determine if your system is vulnerable, run the following command:
# lslpp -l | grep bos.rte.methods
The following filesets are vulnerable:
AIX Level Lower Level Upper Level
5.2.0 18.104.22.168 22.214.171.124
5.3.0 126.96.36.199 188.8.131.52
NOTE: The above filesets are those currently supported by IBM. Previous
versions of the fileset may also be vulnerable. Affected customers are
urged to upgrade to the latest applicable Technology Level and Service
IBM provides the following fixes:
AIX Level APAR number Availability
5.2.0 IZ00531 Available
5.3.0 IZ01433 Available
AIX Version 5 APARs can be downloaded from:
NOTE: Affected customers are urged to upgrade to the latest applicable
Technology Level and Service Pack.
B. INTERIM FIXES
Interim fixes are available. The interim fix can be downloaded via
This is a compressed tarball containing this advisory, interim fix
packages and PGP signatures for each package. The interim fixes below
include prerequisite checking. This will enforce the correct mapping
between the fixes and AIX Technology Levels.
AIX Release & Technology Level Interim fix
IMPORTANT: If possible, it is recommended that a mksysb backup of the
system be created. Verify it is both bootable and readable before
These interim fixes have not been fully regression tested; thus, IBM
does not warrant the fully correct functionality of the interim fix.
Customers install the interim fix and operate the modified version of
AIX at their own risk.
Verify you have retrieved the fixes intact:
The interim fixes below are named by using the technology level
corresponding to the release that the fix applies to. The checksums
below were generated using the "sum" and "md5sum" commands and are as
Filename sum md5sum
IZ00529_08.070807.epkg.Z 52115 34 e11e4c5cc37ec26fde45d80703e76e19
IZ00529_09.070807.epkg.Z 35417 34 dd084a12d8a036b1071345ac4546c1c7
IZ00529_10.070807.epkg.Z 30938 34 1faf9dacf204895b8489c6eeaf82ae8d
IZ01433_04.070807.epkg.Z 56171 37 07b177ca504041214ab35f8e51e135ea
IZ01433_05.070807.epkg.Z 44750 37 79749e131876794ee5518cfacb5c5fee
IZ01433_06.070807.epkg.Z 16878 37 a6badd0df050513eed415c8ff14d8ff0
These sums should match exactly. The PGP signatures in the
compressed tarball and on this advisory can also be used to verify
the integrity of the various files they correspond to. If the sums
or signatures cannot be confirmed, double check the command results
and the download site address. If those are OK, contact IBM AIX
Security at email@example.com and describe the
C. INTERIM FIX INSTALLATION
These packages use the new Interim Fix Management Solution to install
and manage interim fixes. More information can be found at:
To preview an epkg interim fix installation execute the following
# emgr -e ipkg_name -p # where ipkg_name is the name of the
# interim fix package being previewed.
To install an epkg interim fix package, execute the following command:
# emgr -e ipkg_name -X # where ipkg_name is the name of the
# interim fix package being installed.
The "X" flag will expand any filesystems if required.
The following options may be used to mitigate the risk posed by this
vulnerability in lieu of installing interim fix or APAR.
A. OPTION 1
Customers running AIX 5.3.0 TL06 may install the bos.rte.security
fileset and take advantage of the 'fpm' command to disable the setuid
capabilities of many SUID commands.
All the commands addressed by this advisory can be found in the
medium and high fpm databases.
B. OPTION 2
Stack execution disable may be enabled on machines running AIX 5.3 TL05
C. OPTION 3
The users may manually remove the SUID bit of these commands mentioned
Note: Some workarounds may disable functionality for some users.
VII. OBTAINING FIXES
AIX Version 5 APARs can be downloaded from:
Security related Interim Fixes can be downloaded from:
VII. CONTACT INFORMATION
If you would like to receive AIX Security Advisories via email, please
Comments regarding the content of this announcement can be directed to:
To request the PGP public key that can be used to communicate
securely with the AIX Security Team send email to
firstname.lastname@example.org with a subject of "get key". The key
can also be downloaded from a PGP Public Key Server. The key id is
Please contact your local IBM AIX support center for any assistance.
eServer is a trademark of International Business Machines Corporation.
IBM, AIX and pSeries are registered trademarks of International Business
Machines Corporation. All other trademarks are property of their
This vulnerability was discovered internal to IBM as part of its
commitment to secure the AIX operating system.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (AIX)
-----END PGP SIGNATURE-----
Go to the Top of This SecurityTracker Archive Page