Vulnerability Name:

CCN-707

Published:1998-02-11
Updated:1998-02-11
Summary:Some versions of IBM AIX include several insecure temporary files that could allow a local attacker to launch a symlink attack. The temporary files are created with world-writable permissions. This could lead to denial of service attacks or the root user may be tricked into executing the programs while the symbolic link is in place, potentially overwriting or creating arbitrary system files.

The vulnerable commands are not installed as set-user-id programs, therefore, unprivileged users cannot create files in system directories.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:2.6 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:P)
2.3 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:P/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Consequences:File Manipulation
References:Source: CCN
Type: BID-367
AIX Gradient iFOR/LS Insecure Temporary File Creation Vulnerability

Source: CCN
Type: BID-407
AIX logsymptom Insecure Temporary File Creation Vulnerability

Source: XF
Type: UNKNOWN
ibm-symlink(707)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:ibm:aix:3.2.5:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.3:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.1.5:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.2.0:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.2.1.12:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ibm aix 3.2.5
    ibm aix 4.2.1
    ibm aix 4.3
    ibm aix 4.1.1
    ibm aix 4.1.2
    ibm aix 4.1.3
    ibm aix 4.1.4
    ibm aix 4.1.5
    ibm aix 4.2.0
    ibm aix 4.2.1.12