Executive Summary

Informations
Name CVE-2014-3074 First vendor Publication 2014-07-02
Vendor Cve Last vendor Modification 2021-08-31

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3074

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:25850
 
Oval ID: oval:org.mitre.oval:def:25850
Title: AIX Malloc vulnerability
Description: The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program.
Family: unix Class: vulnerability
Reference(s): CVE-2014-3074
Version: 4
Platform(s): IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26578
 
Oval ID: oval:org.mitre.oval:def:26578
Title: AIX Malloc vulnerability
Description: The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program.
Family: unix Class: vulnerability
Reference(s): CVE-2014-3074
Version: 4
Platform(s): IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28775
 
Oval ID: oval:org.mitre.oval:def:28775
Title: AIX Malloc vulnerability
Description: The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program.
Family: unix Class: vulnerability
Reference(s): CVE-2014-3074
Version: 4
Platform(s): IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 17
Os 2

Nessus® Vulnerability Scanner

Date Description
2014-08-20 Name : The remote AIX host is missing a security patch.
File : aix_IV62802.nasl - Type : ACT_GATHER_INFO
2014-08-20 Name : The remote AIX host is missing a security patch.
File : aix_IV62803.nasl - Type : ACT_GATHER_INFO
2014-08-20 Name : The remote AIX host is missing a security patch.
File : aix_IV62805.nasl - Type : ACT_GATHER_INFO
2014-08-20 Name : The remote AIX host is missing a security patch.
File : aix_IV62806.nasl - Type : ACT_GATHER_INFO
2014-08-20 Name : The remote AIX host is missing a security patch.
File : aix_IV62807.nasl - Type : ACT_GATHER_INFO
2014-08-20 Name : The remote AIX host is missing a security patch.
File : aix_IV62808.nasl - Type : ACT_GATHER_INFO
2014-08-20 Name : The remote AIX host is missing a security patch.
File : aix_IV62812.nasl - Type : ACT_GATHER_INFO
2014-07-01 Name : The remote AIX host is missing a security patch.
File : aix_IV60935.nasl - Type : ACT_GATHER_INFO
2014-07-01 Name : The remote AIX host is missing a security patch.
File : aix_IV60940.nasl - Type : ACT_GATHER_INFO
2014-07-01 Name : The remote AIX host is missing a security patch.
File : aix_IV61311.nasl - Type : ACT_GATHER_INFO
2014-07-01 Name : The remote AIX host is missing a security patch.
File : aix_IV61313.nasl - Type : ACT_GATHER_INFO
2014-07-01 Name : The remote AIX host is missing a security patch.
File : aix_IV61314.nasl - Type : ACT_GATHER_INFO
2014-07-01 Name : The remote AIX host is missing a security patch.
File : aix_IV61315.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
AIXAPAR http://www.ibm.com/support/docview.wss?uid=isg1IV60935
http://www.ibm.com/support/docview.wss?uid=isg1IV60940
http://www.ibm.com/support/docview.wss?uid=isg1IV61311
http://www.ibm.com/support/docview.wss?uid=isg1IV61313
http://www.ibm.com/support/docview.wss?uid=isg1IV61314
http://www.ibm.com/support/docview.wss?uid=isg1IV61315
BID http://www.securityfocus.com/bid/68296
BUGTRAQ http://www.securityfocus.com/archive/1/532689/100/0/threaded
CONFIRM http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc
FULLDISC http://seclists.org/fulldisclosure/2014/Jul/31
MISC http://packetstormsecurity.com/files/127390/IBM-AIX-Runtime-Linker-Privilege-...
https://www.portcullis-security.com/security-research-and-downloads/security-...
SECTRACK http://www.securitytracker.com/id/1030504
SECUNIA http://secunia.com/advisories/59344
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/93816

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
Date Informations
2021-08-31 21:23:27
  • Multiple Updates
2021-05-04 12:31:03
  • Multiple Updates
2021-04-22 01:37:41
  • Multiple Updates
2020-05-23 00:40:44
  • Multiple Updates
2018-10-10 00:19:49
  • Multiple Updates
2017-08-29 09:24:31
  • Multiple Updates
2017-01-07 09:25:30
  • Multiple Updates
2016-04-27 00:40:08
  • Multiple Updates
2014-08-21 13:26:38
  • Multiple Updates
2014-07-24 09:24:06
  • Multiple Updates
2014-07-17 09:23:19
  • Multiple Updates
2014-07-03 00:22:19
  • Multiple Updates
2014-07-02 17:22:37
  • First insertion