CVE-2014-0930

The ptrace system call in IBM AIX 5.3, 6.1, and 7.1, and VIOS 2.2.x, allows local users to cause a denial of service (system crash) or obtain sensitive information from kernel memory via a crafted PT_LDINFO operation.
References
Link Resource
http://aix.software.ibm.com/aix/efixes/security/ptrace_advisory.asc Vendor Advisory
http://archives.neohapsis.com/archives/bugtraq/2014-05/0031.html
http://www.ibm.com/support/docview.wss?uid=isg1IV58766 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IV58840 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IV58861 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IV58888 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IV58948 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IV59045
http://www.ibm.com/support/docview.wss?uid=isg1IV59675
https://exchange.xforce.ibmcloud.com/vulnerabilities/92262
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-0930/ Exploit
http://aix.software.ibm.com/aix/efixes/security/ptrace_advisory.asc Vendor Advisory
http://archives.neohapsis.com/archives/bugtraq/2014-05/0031.html
http://www.ibm.com/support/docview.wss?uid=isg1IV58766 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IV58840 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IV58861 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IV58888 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IV58948 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IV59045
http://www.ibm.com/support/docview.wss?uid=isg1IV59675
https://exchange.xforce.ibmcloud.com/vulnerabilities/92262
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-0930/ Exploit
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:03

Type Values Removed Values Added
References () http://aix.software.ibm.com/aix/efixes/security/ptrace_advisory.asc - Vendor Advisory () http://aix.software.ibm.com/aix/efixes/security/ptrace_advisory.asc - Vendor Advisory
References () http://archives.neohapsis.com/archives/bugtraq/2014-05/0031.html - () http://archives.neohapsis.com/archives/bugtraq/2014-05/0031.html -
References () http://www.ibm.com/support/docview.wss?uid=isg1IV58766 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IV58766 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IV58840 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IV58840 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IV58861 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IV58861 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IV58888 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IV58888 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IV58948 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IV58948 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IV59045 - () http://www.ibm.com/support/docview.wss?uid=isg1IV59045 -
References () http://www.ibm.com/support/docview.wss?uid=isg1IV59675 - () http://www.ibm.com/support/docview.wss?uid=isg1IV59675 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/92262 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/92262 -
References () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-0930/ - Exploit () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-0930/ - Exploit

Information

Published : 2014-05-08 10:55

Updated : 2024-11-21 02:03


NVD link : CVE-2014-0930

Mitre link : CVE-2014-0930

CVE.ORG link : CVE-2014-0930


JSON object : View

Products Affected

ibm

  • vios
  • aix