First published: Wed Jul 02 2014(Updated: )
The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Virtual I/O Server (VIOS) | =2.2.0.10 | |
IBM Virtual I/O Server (VIOS) | =2.2.0.11 | |
IBM Virtual I/O Server (VIOS) | =2.2.0.12 | |
IBM Virtual I/O Server (VIOS) | =2.2.0.13 | |
IBM Virtual I/O Server (VIOS) | =2.2.1.0 | |
IBM Virtual I/O Server (VIOS) | =2.2.1.1 | |
IBM Virtual I/O Server (VIOS) | =2.2.1.3 | |
IBM Virtual I/O Server (VIOS) | =2.2.1.4 | |
IBM Virtual I/O Server (VIOS) | =2.2.1.4-fp-25_sp-02 | |
IBM Virtual I/O Server (VIOS) | =2.2.1.8 | |
IBM Virtual I/O Server (VIOS) | =2.2.1.9 | |
IBM Virtual I/O Server (VIOS) | =2.2.2.0 | |
IBM Virtual I/O Server (VIOS) | =2.2.2.4 | |
IBM Virtual I/O Server (VIOS) | =2.2.2.5 | |
IBM Virtual I/O Server (VIOS) | =2.2.3.0 | |
IBM Virtual I/O Server (VIOS) | =2.2.3.2 | |
IBM Virtual I/O Server (VIOS) | =2.2.3.3 | |
IBM AIX | =6.1 | |
IBM AIX | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3074 is classified as a high-severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2014-3074, update the affected IBM AIX or VIOS systems to the latest patches provided by IBM.
CVE-2014-3074 affects IBM AIX 6.1, AIX 7.1, and various versions of IBM VIOS including 2.2.x and 2.2.1.x.
CVE-2014-3074 cannot be exploited remotely as it requires local user access to execute a setuid program with specific environment variables.
Exploitation of CVE-2014-3074 can lead to the creation of a root-owned file, allowing local users to gain elevated privileges on the system.