Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
IBM AIX Buffer Overflow in fileplace Command Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID: 1018550|
SecurityTracker URL: http://securitytracker.com/id/1018550
(Links to External Site)
Updated: Aug 15 2007|
Original Entry Date: Aug 10 2007
Execution of arbitrary code via local system, Root access via local system|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 5.2, 5.3|
A vulnerability was reported in AIX. A local user can obtain root privileges on the target system.|
A local user can trigger a buffer overflow in the fileplace command to execute arbitrary code with root privileges on the target system.
IBM discovered this vulnerability.
A local user can obtain root privileges on the target system.|
The vendor has issued the following APARs.|
For 5.2.0: IZ00154
For 5.3.0: IZ00149
Vendor URL: www.ibm.com/ (Links to External Site)
Source Message Contents
Date: Fri, 10 Aug 2007 15:46:43 -0400|
-----BEGIN PGP SIGNED MESSAGE-----
IBM SECURITY ADVISORY
First Issued: Tue Aug 7 17:36:53 CDT 2007
VULNERABILITY: AIX fileplace Command Buffer Overflow Vulnerability
PLATFORMS: AIX 5.2, 5.3
SOLUTION: Apply the APAR, interim fix or workaround as described
THREAT: An attacker may run arbitrary code with root privileges.
CERT VU Number: n/a
CVE Number: n/a
The fileplace command displays the placement of a specified file within the
logical or physical volumes containing the file.
A buffer overflow vulnerability exists in the fileplace command whereby a
local user may execute arbitrary code with root privileges.
The successful exploitation of this vulnerability allows a non-privileged
user to execute code with root privileges.
IV. PLATFORM VULNERABILITY ASSESSMENT
To determine if your system is vulnerable, run the following command:
# lslpp -l | grep bos.perf.tools
The following filesets levels are vulnerable:
AIX Level Lower Level Upper Level
5.2.0 184.108.40.206 220.127.116.11
5.3.0 18.104.22.168 22.214.171.124
NOTE: IBM only supports the latest two releases (AIX 5.2 & 5.3) and the
latest three Technology Levels (AIX 5.2 TL08, TL09, TL10 & AIX 5.3 TL04,
TL05, TL06). Affected customers are urged to upgrade to the latest
applicable Technology Level and Service Pack.
IBM provides the following fixes:
AIX Level APAR number Availability
5.2.0 IZ00154 Available
5.3.0 IZ00149 Available
AIX Version 5 APARs can be downloaded from:
NOTE: Affected customers are urged to upgrade to the latest applicable
Technology Level and Service Pack.
B. INTERIM FIXES
Interim fixes are available. The interim fix can be downloaded via
This is a compressed tarball containing this advisory, interim fix
packages and PGP signatures for each package. The interim fixes below
include prerequisite checking. This will enforce the correct mapping
between the fixes and AIX Technology Levels.
AIX Release & Technology Level Interim fix
IMPORTANT: If possible, it is recommended that a mksysb backup of the
system be created. Verify it is both bootable and readable before
These interim fixes have not been fully regression tested; thus, IBM
does not warrant the fully correct functionality of the interim fix.
Customers install the interim fix and operate the modified version of
AIX at their own risk.
Verify you have retrieved the fixes intact:
The interim fixes below are named by using the technology level
corresponding to the release that the fix applies to. The checksums
below were generated using the "sum" and "md5sum" commands and are as
Filename sum md5sum
IZ00149_04.070614.epkg.Z 07905 17 7fb600f44737f788f0a79fb6c4235172
IZ00149_05.070614.epkg.Z 40169 17 d8039bd0a0a253b0d52feaaa94c480a0
IZ00149_06.070614.epkg.Z 17005 17 d09b183dc32689b7b7b53e26bac24233
IZ00154_08.070614.epkg.Z 37336 17 e6568799884262a5c7620fd9171ae546
IZ00154_09.070614.epkg.Z 19912 17 b816616774d66acb565403282823e3d7
IZ00154_10.070614.epkg.Z 10830 17 98f71db66ed488d2528de7907c45b08f
These sums should match exactly. The PGP signatures in the
compressed tarball and on this advisory can also be used to verify
the integrity of the various files they correspond to. If the sums
or signatures cannot be confirmed, double check the command results
and the download site address. If those are OK, contact IBM AIX
Security at email@example.com and describe the
C. INTERIM FIX INSTALLATION
These packages use the new Interim Fix Management Solution to install
and manage interim fixes. More information can be found at:
To preview an epkg interim fix installation execute the following
# emgr -e ipkg_name -p # where ipkg_name is the name of the
# interim fix package being previewed.
To install an epkg interim fix package, execute the following command:
# emgr -e ipkg_name -X # where ipkg_name is the name of the
# interim fix package being installed.
The "X" flag will expand any filesystems if required.
There are several workarounds, which may be implemented.
A. OPTION 1
If the program is unnecessary, it may be removed with the following
# rm -f /usr/bin/fileplace
NOTE:To restore this command, the entire bos.perf.tools package must be
B. OPTION 2
Change the permissions of this command to remove the setuid bit using
the following command:
# chmod 500 /usr/bin/fileplace
NOTE: This will disable functionality of the command for all users
C. OPTION 3
Customers running AIX 5.3.0 TL06 may install the bos.rte.security
fileset and take advantage of the 'fpm' command to disable the setuid
capabilities of many SUID commands.
The fileplace command is addressed by the medium and high fpm
D. OPTION 3
Stack execution disable may be enabled on machines running AIX 5.3 TL05
VII. OBTAINING FIXES
AIX Version 5 APARs can be downloaded from:
Security related Interim Fixes can be downloaded from:
VII. CONTACT INFORMATION
If you would like to receive AIX Security Advisories via email, please
Comments regarding the content of this announcement can be directed to:
To request the PGP public key that can be used to communicate
securely with the AIX Security Team you can either:
A. Send an email with "get key" in the subject line to:
B. Download the key from a PGP Public Key Server. The key ID is:
Please contact your local IBM AIX support center for any assistance.
eServer is a trademark of International Business Machines Corporation.
IBM, AIX and pSeries are registered trademarks of International Business
Machines Corporation. All other trademarks are property of their
This vulnerability was discovered internal to IBM as part of its
commitment to securing the AIX operating system.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (AIX)
-----END PGP SIGNATURE-----
Go to the Top of This SecurityTracker Archive Page