CVE-2009-2727

Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII string to remote procedure 15.
References
Link Resource
http://aix.software.ibm.com/aix/efixes/security/libtt_advisory.asc Vendor Advisory
http://risesecurity.org/advisories/RISE-2009001.txt
http://secunia.com/advisories/35505 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52842 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52843 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52844 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52845 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52846 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52847 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52848 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52849 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52850 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52851 Vendor Advisory
http://www.securityfocus.com/bid/35419 Exploit
http://www.vupen.com/english/advisories/2009/1620 Patch Vendor Advisory
http://aix.software.ibm.com/aix/efixes/security/libtt_advisory.asc Vendor Advisory
http://risesecurity.org/advisories/RISE-2009001.txt
http://secunia.com/advisories/35505 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52842 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52843 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52844 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52845 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52846 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52847 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52848 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52849 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52850 Vendor Advisory
http://www.ibm.com/support/docview.wss?uid=isg1IZ52851 Vendor Advisory
http://www.securityfocus.com/bid/35419 Exploit
http://www.vupen.com/english/advisories/2009/1620 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.2.0:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.2.0.50:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.2.0.54:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.2.2:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.2_l:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.3.0:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.3.7:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.3.8:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.3.9:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.3.10:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:6.1.0:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:6.1.1:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:6.1.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:05

Type Values Removed Values Added
References () http://aix.software.ibm.com/aix/efixes/security/libtt_advisory.asc - Vendor Advisory () http://aix.software.ibm.com/aix/efixes/security/libtt_advisory.asc - Vendor Advisory
References () http://risesecurity.org/advisories/RISE-2009001.txt - () http://risesecurity.org/advisories/RISE-2009001.txt -
References () http://secunia.com/advisories/35505 - Vendor Advisory () http://secunia.com/advisories/35505 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IZ52842 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IZ52842 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IZ52843 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IZ52843 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IZ52844 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IZ52844 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IZ52845 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IZ52845 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IZ52846 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IZ52846 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IZ52847 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IZ52847 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IZ52848 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IZ52848 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IZ52849 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IZ52849 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IZ52850 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IZ52850 - Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=isg1IZ52851 - Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=isg1IZ52851 - Vendor Advisory
References () http://www.securityfocus.com/bid/35419 - Exploit () http://www.securityfocus.com/bid/35419 - Exploit
References () http://www.vupen.com/english/advisories/2009/1620 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/1620 - Patch, Vendor Advisory

Information

Published : 2009-08-10 23:30

Updated : 2024-11-21 01:05


NVD link : CVE-2009-2727

Mitre link : CVE-2009-2727

CVE.ORG link : CVE-2009-2727


JSON object : View

Products Affected

ibm

  • aix
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer