First published: Wed Dec 22 2004(Updated: )
Untrusted execution path vulnerability in invscout in IBM AIX 5.1.0, 5.2.0, and 5.3.0 allows local users to gain privileges by modifying the PATH environment variable to point to a malicious "uname" program, which is executed from lsvpd after lsvpd has been invoked by invscout.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM AIX | =5.3_l | |
IBM AIX | =5.3 | |
IBM AIX | =5.2 | |
IBM AIX | =5.2_l | |
IBM AIX | =5.2.2 | |
IBM AIX | =5.1l | |
IBM AIX | =5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1054 is considered a high severity vulnerability due to its potential to allow local users to gain elevated privileges.
To mitigate CVE-2004-1054, users should avoid allowing untrusted modifications to the PATH environment variable and apply any security patches provided by IBM.
CVE-2004-1054 affects local users on IBM AIX versions 5.1.0, 5.2.0, and 5.3.0.
CVE-2004-1054 is caused by the invscout program executing a malicious 'uname' program pointed to by a modified PATH environment variable.
No, CVE-2004-1054 requires local access to the system, making it a local privilege escalation vulnerability.