CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

IBM : Security Vulnerabilities Published In 2007 (Gain Privilege)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2007-6594 264 +Priv 2007-12-28 2008-11-15
6.9
Admin Local Medium Not required Complete Complete Complete
IBM Lotus Notes 8 for Linux before 8.0.1 uses (1) unspecified weak permissions for the installation kit obtained through a Notes 8 download and (2) 0777 permissions for the installdata file that is created by setup.sh, which allows local users to gain privileges via a Trojan horse file.
2 CVE-2007-6305 119 Overflow +Priv 2007-12-10 2008-09-05
4.6
None Local Low Not required Partial Partial Partial
Multiple unspecified vulnerabilities in IBM Hardware Management Console (HMC) 7 R3.2.0 allow attackers to gain privileges via "some HMC commands."
3 CVE-2007-6294 264 +Priv 2007-12-10 2008-11-15
4.9
None Local Low Not required None None Complete
Multiple unspecified vulnerabilities in IBM Hardware Management Console (HMC) 3 R3.7 allow attackers to gain privileges via "some HMC commands."
4 CVE-2007-6293 +Priv 2007-12-10 2008-11-15
10.0
Admin Remote Low Not required Complete Complete Complete
Multiple unspecified vulnerabilities in IBM Hardware Management Console (HMC) 6 R1.3 allow attackers to gain privileges via "some HMC commands."
5 CVE-2007-5956 22 +Priv Dir. Trav. 2007-11-14 2008-09-05
7.2
None Local Low Not required Complete Complete Complete
Directory traversal vulnerability in IBM Informix Dynamic Server (IDS) before 10.00.xC7W1 allows local users to gain privileges by referencing modified NLS message files through directory traversal sequences in the DBLANG environment variable.
6 CVE-2007-5700 +Priv +Info 2007-10-29 2008-11-15
6.3
None Remote Medium Single system Complete None None
The Evaluate LotusScript method in IBM Lotus Domino before 7.0.3 uses an incorrect security context for @ formula commands in some circumstances, which might allow remote authenticated users to gain privileges and obtain sensitive information.
7 CVE-2007-4797 119 Overflow +Priv 2007-09-10 2008-11-15
7.2
Admin Local Low Not required Complete Complete Complete
Multiple buffer overflows in unspecified svprint (System V print) commands in bos.svprint.rte in IBM AIX 5.2 and 5.3 allow local users to gain privileges via unspecified vectors.
8 CVE-2007-4796 119 Overflow +Priv 2007-09-10 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in uucp in bos.net.uucp in IBM AIX 5.2 and 5.3 allows local users to gain privileges via unspecified vectors.
9 CVE-2007-4795 119 Overflow +Priv 2007-09-10 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in mkpath in bos.rte.methods in IBM AIX 5.2 and 5.3 allows local users to gain privileges via a long ODM name.
10 CVE-2007-4794 119 Overflow +Priv 2007-09-10 2008-11-15
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in fcstat in devices.common.IBM.fc.rte in IBM AIX 5.2 and 5.3 allows local users to gain privileges via a long input parameter.
11 CVE-2007-4793 119 Overflow +Priv 2007-09-10 2008-11-15
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in xlplm in plm.server.rte in IBM AIX 5.2 and 5.3 allows local users to gain privileges via unspecified vectors.
12 CVE-2007-4792 119 Overflow +Priv 2007-09-10 2008-11-15
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in ibstat in devices.common.IBM.ib.rte in IBM AIX 5.3 allows local users to gain privileges via unspecified vectors.
13 CVE-2007-4791 119 Overflow +Priv 2007-09-10 2012-11-05
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in the swcons command in bos.rte.console in IBM AIX 5.2 and 5.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2005-3504 and CVE-2007-0978.
14 CVE-2007-4622 189 +Priv 2007-11-05 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
Integer underflow in the dns_name_fromtext function in (1) libdns_nonsecure.a and (2) libdns_secure.a in IBM AIX 5.2 allows local users to gain privileges via a crafted "-y" (TSIG key) command line argument to dig.
15 CVE-2007-4621 119 Overflow +Priv 2007-11-05 2008-11-15
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in crontab in IBM AIX 5.2 allows local users to gain privileges via long command line arguments.
16 CVE-2007-4513 119 Overflow +Priv 2007-11-05 2009-03-04
7.2
Admin Local Low Not required Complete Complete Complete
Multiple stack-based buffer overflows in IBM AIX 5.2 and 5.3 allow local users to gain privileges via a long argument to the (1) "-p" option to lqueryvg or (2) the "-V" option to lquerypv.
17 CVE-2007-4355 Overflow +Priv 2007-08-14 2008-11-15
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in the at program on IBM AIX 5.3 allows local users to gain privileges via unspecified vectors.
18 CVE-2007-4354 Overflow +Priv 2007-08-14 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in fileplace in bos.perf.tools in IBM AIX 5.2 and 5.3 allows local users to gain privileges via unspecified vectors.
19 CVE-2007-4353 Overflow +Priv 2007-08-14 2008-09-05
6.9
Admin Local Medium Not required Complete Complete Complete
Multiple buffer overflows in IBM AIX 5.2 and 5.3 allow local users in the system group to gain root privileges via unspecified vectors involving the (1) chpath, (2) rmpath, and (3) devinstall programs in bos.rte.methods.
20 CVE-2007-4275 +Priv 2007-08-18 2008-09-05
6.9
Admin Local Medium Not required Complete Complete Complete
Multiple untrusted search path vulnerabilities in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allow local users to gain privileges via certain vectors related to (1) DB2 instance or FMP startup on Linux and Solaris; (2) exec of executables while running as root on non-Windows systems, as demonstrated by AIX; and unspecified vectors involving (3) db2licm and (4) db2pd.
21 CVE-2007-4270 +Priv 2007-08-18 2008-09-05
6.9
Admin Local Medium Not required Complete Complete Complete
Multiple race conditions in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allow local users to gain root privileges via a symlink attack on certain files.
22 CVE-2007-4238 +Priv 2007-08-08 2008-11-15
6.9
Admin Local Medium Not required Complete Complete Complete
AIX 5.2 and 5.3 install pioinit with user and group ownership of bin, which allows local users with bin or possibly printq privileges to gain root privileges by modifying pioinit.
23 CVE-2007-4237 Overflow +Priv 2007-08-08 2008-11-15
6.9
Admin Local Medium Not required Complete Complete Complete
Buffer overflow in the atm subset in arp in devices.common.IBM.atm.rte in AIX 5.2 and 5.3 allows local users to gain root privileges.
24 CVE-2007-4236 Overflow +Priv 2007-08-08 2008-09-05
6.9
Admin Local Medium Not required Complete Complete Complete
Buffer overflow in lpd in bos.rte.printers in AIX 5.2 and 5.3 allows local users with printq group privileges to gain root privileges.
25 CVE-2007-4217 119 Overflow +Priv 2007-11-05 2009-07-24
7.2
Admin Local Low Not required Complete Complete Complete
Stack-based buffer overflow in the domacro function in ftp in IBM AIX 5.2 and 5.3 allows local users to gain privileges via a long parameter to a macro, as demonstrated by executing a macro via the '$' command.
26 CVE-2007-2996 +Priv 2007-06-04 2012-10-30
6.6
Admin Local Medium Single system Complete Complete Complete
Unspecified vulnerability in perl.rte 5.8.0.10 through 5.8.0.95 on IBM AIX 5.2, and 5.8.2.10 through 5.8.2.50 on AIX 5.3, allows local users to gain privileges via unspecified vectors related to the installation and "waiting for a legitimate user to execute a binary that ships with Perl."
27 CVE-2007-0978 Overflow +Priv 2007-02-15 2008-11-15
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in swcons in IBM AIX 5.3 allows local users to gain privileges via long input data.
28 CVE-2007-0392 +Priv 2007-01-19 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
IBM AIX 5.3 does not properly verify the status of file descriptors before setuid execution, which allows local users to gain privileges by closing file descriptor 0, 1, or 2 and then invoking a setuid program, a variant of CVE-2002-0572.
29 CVE-2007-0068 +Priv 2007-06-06 2008-11-15
9.3
Admin Remote Medium Not required Complete Complete Complete
IBM Lotus Domino 7.0.x before 7.0.3 does not revalidate the signature on a signed scheduled agent after the agent is modified, which allows remote authenticated users to gain privileges via a modified agent in a server database.
Total number of vulnerabilities : 29   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.