AIX Sendmail Open Relay功能默认打开漏洞 (AIX,缺陷)
源:http://www.51cto.com/art/200606/27748.htm
评:
摘要:IBM又一个公认的漏洞和弱点存在于IBM HMC中,这可前在被恶意本地用户运用得到的非法权限操作执行某些攻击,可被恶意攻击者危及到一个易受攻击系统的安全。
标签:IBM
信息提供:
安全公告(或线索)提供热线:51cto.editor@gmail.com
漏洞类别:
非法权限增大
系统共计
攻击类型:
远程攻击
发布日期:
2006-06-22
更新日期:
2006-06-23
受影响系统:
IBM Hardware Management Console (HMC)
安全系统:
无
漏洞报告人:
厂商
漏洞描述:
Secunia Advisory:SA20723
IBM又一个公认的漏洞和弱点存在于IBM HMC中,这可前在被恶意本地用户运用得到的非法权限操作执行某些攻击,可被恶意攻击者危及到一个易受攻击系统的安全。
更多信息:
SA19342
SA18579
这个漏洞和弱点已经在版本5.2.1 (V5 R2.1)中被报告。
测试方法:
无
解决方法:
提供安全修正MH00688。
http://www14.software.ibm.com/we...power5/download/v521.Update.html
-------------
源:http://secunia.com/advisories/20723/
IBM HMC Sendmail and OpenSSH Vulnerabilities
Secunia Advisory SA20723
Where:
From remote
Impact:
Privilege escalation, System access
Solution Status:
Vendor Patch
Operating System:
IBM Hardware Management Console (HMC)
CVE Reference(s):
CVE-2006-0058
CVE-2006-0225
Description
IBM has acknowledged a vulnerability and a weakness in IBM HMC, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges, and by malicious people to compromise a vulnerable system.
For more information:
SA19342
SA18579
The vulnerability and weakness have been reported in version 5.2.1 (V5 R2.1).
Solution:
Apply security fix MH00688.
Further details available to Secunia VIM customers
Original Advisory:
http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688
Deep Links:
Links available to Secunia VIM customers