vendor:
AIX
by:
hxmonsegur
7,8
CVSS
HIGH
Local Privilege Escalation
264
CWE
Product Name: AIX
Affected Version From: AIX 6.1, 7.1, 7.2, VIOS 2.2.x
Affected Version To: AIX 6.1, 7.1, 7.2, VIOS 2.2.x
Patch Exists: YES
Related CWE: CVE-2016-8972
CPE: o:ibm:aix:6.1
Metasploit:
https://www.rapid7.com/db/vulnerabilities/ibm-aix-cve-2016-8972/, https://www.rapid7.com/db/vulnerabilities/aix-7.1.3-bellmail_advisory_cve-2016-8972/, https://www.rapid7.com/db/vulnerabilities/aix-7.1.4-bellmail_advisory_cve-2016-8972/, https://www.rapid7.com/db/vulnerabilities/aix-6.1.9-bellmail_advisory_cve-2016-8972/, https://www.rapid7.com/db/vulnerabilities/aix-7.2.0-bellmail_advisory_cve-2016-8972/, https://www.rapid7.com/db/vulnerabilities/aix-7.2.1-bellmail_advisory_cve-2016-8972/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: AIX, VIOS
2016
IBM AIX Bellmail local root
This exploit is for IBM AIX Bellmail local root vulnerability. It is a local privilege escalation vulnerability that affects AIX 6.1, 7.1, 7.2 and VIOS 2.2.x. The exploit uses the bellmail binary to inject a payload into the /etc/suid_profile file which is then executed to gain root privileges. The exploit then creates a root shell in /tmp/shell-<random_number> and sets the permissions to 6755.
Mitigation:
The user should update the bellmail binary to the latest version available from IBM.