First published: Tue Dec 09 2008(Updated: )
Buffer overflow in autoconf6 in IBM AIX 6.1.0 through 6.1.2, when Role-Based Access Control is enabled, allows local users with aix.network.config.tcpip authorization to gain privileges via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM AIX | =6.1.1 | |
IBM AIX | =6.1 | |
IBM AIX | =6.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5387 is considered to have high severity due to the potential for privilege escalation.
To fix CVE-2008-5387, you should apply the appropriate patches provided by IBM for AIX versions 6.1.0, 6.1.1, and 6.1.2.
Local users with aix.network.config.tcpip authorization on IBM AIX versions 6.1.0 through 6.1.2 are affected by CVE-2008-5387.
CVE-2008-5387 allows attackers to exploit a buffer overflow to gain elevated privileges.
Yes, CVE-2008-5387 is specifically mentioned in the context of Role-Based Access Control being enabled.