First published: Mon Mar 31 2008(Updated: )
The checkpoint and restart feature in the kernel in IBM AIX 5.2, 5.3, and 6.1 does not properly protect kernel memory, which allows local users to read and modify portions of memory and gain privileges via unspecified vectors involving a restart of a 64-bit process, probably related to the as_getadsp64 function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM AIX | =5.3 | |
IBM AIX | =5.2 | |
IBM AIX | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1593 has a high severity rating due to its potential to allow local users to gain elevated privileges.
CVE-2008-1593 affects IBM AIX versions 5.2, 5.3, and 6.1.
To fix CVE-2008-1593, you should apply the latest security patches released by IBM for your version of AIX.
CVE-2008-1593 can be exploited by local users to read and modify kernel memory, which can lead to privilege escalation.
While applying patches is the best solution, restricting access to the affected AIX systems can serve as a temporary workaround.