CVE-2008-2513

Current Description

Buffer overflow in the kernel in IBM AIX 5.2, 5.3, and 6.1 allows local users to execute arbitrary code in kernel mode via unknown attack vectors.

Basic Data

PublishedJune 02, 2008
Last ModifiedSeptember 29, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-119
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSIbmAix5.2*******
    2.3OSIbmAix5.3*******
    2.3OSIbmAix6.1*******

Vulnerable Software List

VendorProductVersions
Ibm Aix 5.2, 5.3, 6.1

References

NameSourceURLTags
http://aix.software.ibm.com/aix/efixes/security/unix_advisory.aschttp://aix.software.ibm.com/aix/efixes/security/unix_advisory.ascCONFIRM
30349http://secunia.com/advisories/30349SECUNIA
1020083http://securitytracker.com/id?1020083SECTRACK
IZ19911http://www.ibm.com/support/docview.wss?uid=isg1IZ19911AIXAPARPATCH
IZ21481http://www.ibm.com/support/docview.wss?uid=isg1IZ21481AIXAPARPATCH
IZ22368http://www.ibm.com/support/docview.wss?uid=isg1IZ22368AIXAPAR
IZ22369http://www.ibm.com/support/docview.wss?uid=isg1IZ22369AIXAPAR
IZ22370http://www.ibm.com/support/docview.wss?uid=isg1IZ22370AIXAPAR
29329http://www.securityfocus.com/bid/29329BID
ADV-2008-1626http://www.vupen.com/english/advisories/2008/1626/referencesVUPEN
ibm-aix-aix-bo(42577)https://exchange.xforce.ibmcloud.com/vulnerabilities/42577XF
oval:org.mitre.oval:def:5684https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5684OVAL