Vulnerability Details : CVE-2014-3074
The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program.
Products affected by CVE-2014-3074
- cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:vios:2.2.1.4:fp-25_sp-02:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3074
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3074
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2014-3074
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3074
-
http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc
Vendor Advisory
-
http://www.ibm.com/support/docview.wss?uid=isg1IV61315
IBM IV61315: A POTENTIAL SECURITY ISSUE EXISTS CVE-2014-3074Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/93816
IBM AIX MALLOC privilege escalation CVE-2014-3074 Vulnerability Report
-
http://www.ibm.com/support/docview.wss?uid=isg1IV60935
IBM IV60935: A POTENTIAL SECURITY ISSUE EXISTS CVE-2014-3074 APPLIES TO AIX 6100-09Vendor Advisory
-
http://www.securitytracker.com/id/1030504
IBM AIX Lets Local Users Gain Elevated Privileges - SecurityTracker
-
http://www.ibm.com/support/docview.wss?uid=isg1IV61311
IBM IV61311: A POTENTIAL SECURITY ISSUE EXISTS CVE-2014-3074 APPLIES TO AIX 6100-08Vendor Advisory
-
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-3074/
cve-2014-3074 - Portcullis
-
http://www.ibm.com/support/docview.wss?uid=isg1IV61314
IBM IV61314: A POTENTIAL SECURITY ISSUE EXISTS CVE-2014-3074 APPLIES TO AIX 7100-02Vendor Advisory
-
http://www.securityfocus.com/bid/68296
IBM AIX CVE-2014-3074 Temporary File Creation Vulnerability
-
http://seclists.org/fulldisclosure/2014/Jul/31
Full Disclosure: CVE-2014-3074 - Runtime Linker Allows Privilege Escalation Via Arbitrary File Writes in IBM AIX
-
http://packetstormsecurity.com/files/127390/IBM-AIX-Runtime-Linker-Privilege-Escalation.html
IBM AIX Runtime Linker Privilege Escalation ≈ Packet Storm
-
http://www.ibm.com/support/docview.wss?uid=isg1IV61313
IBM IV61313: A POTENTIAL SECURITY ISSUE EXISTS CVE-2014-3074Vendor Advisory
-
http://www.ibm.com/support/docview.wss?uid=isg1IV60940
IBM IV60940: A POTENTIAL SECURITY ISSUE EXISTS CVE-2014-3074 APPLIES TO AIX 7100-03Vendor Advisory
-
http://www.securityfocus.com/archive/1/532689/100/0/threaded
SecurityFocus
Jump to