First published: Mon Dec 20 2004(Updated: )
Untrusted execution path vulnerability in the diag commands (1) lsmcode, (2) diag_exec, (3) invscout, and (4) invscoutd in AIX 5.1 through 5.3 allows local users to execute arbitrary programs by modifying the DIAGNOSTICS environment variable to point to a malicious Dctrl program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM AIX | =5.3_l | |
IBM AIX | =5.3 | |
IBM AIX | =5.2 | |
IBM AIX | =5.2_l | |
IBM AIX | =5.2.2 | |
IBM AIX | =5.1l | |
IBM AIX | =5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1329 is considered a high severity vulnerability due to the potential for local users to execute arbitrary programs on affected AIX systems.
To fix CVE-2004-1329, you should update your AIX system to the latest available patches that address this vulnerability.
CVE-2004-1329 affects IBM AIX versions 5.1, 5.2, and 5.3.
Exploiting CVE-2004-1329 allows local users to gain elevated privileges by executing unauthorized commands, potentially compromising the system.
Local users on IBM AIX systems running versions 5.1, 5.2, or 5.3 are vulnerable to CVE-2004-1329.