Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2012-4833 | First vendor Publication | 2012-10-01 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 2.1 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
fuser in IBM AIX 6.1 and 7.1, and VIOS 2.2.1.4-FP-25 SP-02, does not properly restrict the -k option, which allows local users to kill arbitrary processes via a crafted command line. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4833 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20943 | |||
Oval ID: | oval:org.mitre.oval:def:20943 | ||
Title: | AIX fuser vulnerability | ||
Description: | fuser in IBM AIX 6.1 and 7.1, and VIOS 2.2.1.4-FP-25 SP-02, does not properly restrict the -k option, which allows local users to kill arbitrary processes via a crafted command line. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-4833 | Version: | 5 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Os | 2 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-12-03 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U854544.nasl - Type : ACT_GATHER_INFO |
2013-05-01 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U854841.nasl - Type : ACT_GATHER_INFO |
2013-05-01 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U854868.nasl - Type : ACT_GATHER_INFO |
2013-03-28 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U854603.nasl - Type : ACT_GATHER_INFO |
2013-03-28 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U855520.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV28151.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV28749.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV28754.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV28756.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV29207.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV29289.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 22:59:43 |
|
2024-11-28 12:31:42 |
|
2021-08-31 21:23:27 |
|
2021-05-04 12:21:44 |
|
2021-04-22 01:25:53 |
|
2020-05-23 00:34:46 |
|
2017-08-29 09:24:02 |
|
2016-04-26 22:17:51 |
|
2015-04-04 13:27:19 |
|
2014-02-17 11:13:38 |
|
2013-05-10 22:46:59 |
|
2013-02-14 13:24:57 |
|
2013-02-07 13:20:44 |
|
2013-01-30 13:23:46 |
|