AIX Sendmail Open Relay功能默认打开漏洞 (AIX,缺陷)

源:http://www.51cto.com/art/200606/27748.htm
评:


    摘要:IBM又一个公认的漏洞和弱点存在于IBM HMC中,这可前在被恶意本地用户运用得到的非法权限操作执行某些攻击,可被恶意攻击者危及到一个易受攻击系统的安全。
    标签:IBM


信息提供:
安全公告(或线索)提供热线:[email protected]

漏洞类别:


非法权限增大
系统共计

攻击类型:
远程攻击

发布日期:
2006-06-22

更新日期:


2006-06-23

受影响系统:
IBM Hardware Management Console (HMC)

安全系统:




漏洞报告人:


厂商

漏洞描述:


Secunia Advisory:SA20723

IBM又一个公认的漏洞和弱点存在于IBM HMC中,这可前在被恶意本地用户运用得到的非法权限操作执行某些攻击,可被恶意攻击者危及到一个易受攻击系统的安全。
更多信息:
SA19342
SA18579
这个漏洞和弱点已经在版本5.2.1 (V5 R2.1)中被报告。

测试方法:


解决方法:
提供安全修正MH00688。
http://www14.software.ibm.com/we...power5/download/v521.Update.html

-------------

源:http://secunia.com/advisories/20723/

IBM HMC Sendmail and OpenSSH Vulnerabilities

Secunia Advisory SA20723

Where:

From remote

Impact:

Privilege escalation, System access

Solution Status:

Vendor Patch

Operating System:

IBM Hardware Management Console (HMC)

CVE Reference(s):

CVE-2006-0058

CVE-2006-0225
Description

IBM has acknowledged a vulnerability and a weakness in IBM HMC, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges, and by malicious people to compromise a vulnerable system.

For more information:
SA19342
SA18579

The vulnerability and weakness have been reported in version 5.2.1 (V5 R2.1).

Solution:
Apply security fix MH00688.

Further details available to Secunia VIM customers

Original Advisory:
http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688

Deep Links:
Links available to Secunia VIM customers


猜你喜欢

转载自mauersu.iteye.com/blog/1982755
AIX