Executive Summary

Informations
Name CVE-2009-2727 First vendor Publication 2009-08-10
Vendor Cve Last vendor Modification 2009-08-11

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII string to remote procedure 15.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2727

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 16

Open Source Vulnerability Database (OSVDB)

Id Description
55151 IBM AIX ToolTalk Library (libtt.a) _tt_internal_realpath Function Overflow

A buffer overflow exists in AIX. The ToolTalk library fails to validate data passed to the _tt_internal_realpath function resulting in a buffer overflow. With a specially crafted request, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 AIX ttdbserv function 15 buffer overflow attempt
RuleID : 16285 - Revision : 6 - Type : PROTOCOL-RPC

Nessus® Vulnerability Scanner

Date Description
2013-01-30 Name : The remote AIX host is missing a security patch.
File : aix_IZ52843.nasl - Type : ACT_GATHER_INFO
2013-01-30 Name : The remote AIX host is missing a security patch.
File : aix_IZ52844.nasl - Type : ACT_GATHER_INFO
2013-01-30 Name : The remote AIX host is missing a security patch.
File : aix_IZ52845.nasl - Type : ACT_GATHER_INFO
2013-01-30 Name : The remote AIX host is missing a security patch.
File : aix_IZ52846.nasl - Type : ACT_GATHER_INFO
2013-01-30 Name : The remote AIX host is missing a security patch.
File : aix_IZ52848.nasl - Type : ACT_GATHER_INFO
2013-01-30 Name : The remote AIX host is missing a security patch.
File : aix_IZ52849.nasl - Type : ACT_GATHER_INFO
2013-01-30 Name : The remote AIX host is missing a security patch.
File : aix_IZ52850.nasl - Type : ACT_GATHER_INFO
2013-01-30 Name : The remote AIX host is missing a security patch.
File : aix_IZ52851.nasl - Type : ACT_GATHER_INFO
2013-01-30 Name : The remote AIX host is missing a security patch.
File : aix_IZ52842.nasl - Type : ACT_GATHER_INFO
2010-01-26 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U829313.nasl - Type : ACT_GATHER_INFO
2009-12-27 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U828448.nasl - Type : ACT_GATHER_INFO
2009-11-13 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U829609.nasl - Type : ACT_GATHER_INFO
2009-11-13 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U829533.nasl - Type : ACT_GATHER_INFO
2009-11-13 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U829416.nasl - Type : ACT_GATHER_INFO
2009-09-29 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U828611.nasl - Type : ACT_GATHER_INFO
2009-09-29 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U828561.nasl - Type : ACT_GATHER_INFO
2009-09-29 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U828317.nasl - Type : ACT_GATHER_INFO
2009-07-17 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U827247.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
AIXAPAR http://www.ibm.com/support/docview.wss?uid=isg1IZ52842
http://www.ibm.com/support/docview.wss?uid=isg1IZ52843
http://www.ibm.com/support/docview.wss?uid=isg1IZ52844
http://www.ibm.com/support/docview.wss?uid=isg1IZ52845
http://www.ibm.com/support/docview.wss?uid=isg1IZ52846
http://www.ibm.com/support/docview.wss?uid=isg1IZ52847
http://www.ibm.com/support/docview.wss?uid=isg1IZ52848
http://www.ibm.com/support/docview.wss?uid=isg1IZ52849
http://www.ibm.com/support/docview.wss?uid=isg1IZ52850
http://www.ibm.com/support/docview.wss?uid=isg1IZ52851
BID http://www.securityfocus.com/bid/35419
CONFIRM http://aix.software.ibm.com/aix/efixes/security/libtt_advisory.asc
MISC http://risesecurity.org/advisories/RISE-2009001.txt
SECUNIA http://secunia.com/advisories/35505
VUPEN http://www.vupen.com/english/advisories/2009/1620

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
Date Informations
2021-05-04 12:09:55
  • Multiple Updates
2021-04-22 01:10:17
  • Multiple Updates
2020-05-23 13:16:53
  • Multiple Updates
2020-05-23 00:24:08
  • Multiple Updates
2016-04-26 19:01:25
  • Multiple Updates
2014-02-17 10:51:06
  • Multiple Updates
2014-01-19 21:26:06
  • Multiple Updates
2013-05-10 23:55:17
  • Multiple Updates