Executive Summary

Informations
Name CVE-2008-1599 First vendor Publication 2008-03-31
Vendor Cve Last vendor Modification 2017-09-29

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The nddstat programs on IBM AIX 5.2, 5.3, and 6.1 do not properly handle environment variables, which allows local users to gain privileges by invoking (1) atmstat, (2) entstat, (3) fddistat, (4) hdlcstat, or (5) tokstat.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1599

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5468
 
Oval ID: oval:org.mitre.oval:def:5468
Title: IBM AIX 'nddstat' Commands Let Local Users Gain Root Privileges
Description: The nddstat programs on IBM AIX 5.2, 5.3, and 6.1 do not properly handle environment variables, which allows local users to gain privileges by invoking (1) atmstat, (2) entstat, (3) fddistat, (4) hdlcstat, or (5) tokstat.
Family: unix Class: vulnerability
Reference(s): CVE-2008-1599
Version: 2
Platform(s): IBM AIX 5.2
IBM AIX 5.3
IBM AIX 6.1
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 3

Open Source Vulnerability Database (OSVDB)

Id Description
43134 IBM AIX nddstat /usr/sbin/tokstat Local Privilege Escalation

IBM AIX contains a flaw related to the nndstat command /usr/sbin/atmstat that may allow a local attacker to execute arbitrary code with root privileges. No further details have been provided.
43133 IBM AIX nddstat /usr/sbin/hdlcstat Local Privilege Escalation

IBM AIX contains a flaw related to the nndstat command /usr/sbin/atmstat that may allow a local attacker to execute arbitrary code with root privileges. No further details have been provided.
43132 IBM AIX nddstat /usr/sbin/fddistat Local Privilege Escalation

IBM AIX contains a flaw related to the nndstat command /usr/sbin/atmstat that may allow a local attacker to execute arbitrary code with root privileges. No further details have been provided.
43131 IBM AIX nddstat /usr/sbin/entstat Local Privilege Escalation

IBM AIX contains a flaw related to the nndstat command /usr/sbin/atmstat that may allow a local attacker to execute arbitrary code with root privileges. No further details have been provided.
43130 IBM AIX nddstat /usr/sbin/atmstat Local Privilege Escalation

IBM AIX contains a flaw related to the nndstat command /usr/sbin/atmstat that may allow a local attacker to execute arbitrary code with root privileges. No further details have been provided.

Nessus® Vulnerability Scanner

Date Description
2013-01-30 Name : The remote AIX host is missing a security patch.
File : aix_IZ16991.nasl - Type : ACT_GATHER_INFO
2013-01-30 Name : The remote AIX host is missing a security patch.
File : aix_IZ17058.nasl - Type : ACT_GATHER_INFO
2013-01-30 Name : The remote AIX host is missing a security patch.
File : aix_IZ17059.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
AIXAPAR http://www.ibm.com/support/docview.wss?uid=isg1IZ16975
http://www.ibm.com/support/docview.wss?uid=isg1IZ16991
http://www.ibm.com/support/docview.wss?uid=isg1IZ17058
http://www.ibm.com/support/docview.wss?uid=isg1IZ17059
CONFIRM http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&I...
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&I...
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&I...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECTRACK http://securitytracker.com/id?1019604
VUPEN http://www.vupen.com/english/advisories/2008/0865

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2021-05-04 12:07:21
  • Multiple Updates
2021-04-22 01:07:46
  • Multiple Updates
2020-05-23 00:21:31
  • Multiple Updates
2017-09-29 09:23:29
  • Multiple Updates
2016-04-26 17:16:36
  • Multiple Updates
2014-02-17 10:44:31
  • Multiple Updates
2013-05-11 00:14:01
  • Multiple Updates