Vulnerabilities > IBM > AIX > 3.2.0

DATE CVE VULNERABILITY TITLE RISK
2010-08-30 CVE-2010-3187 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in IBM AIX
Buffer overflow in ftpd in IBM AIX 5.3 and earlier allows remote attackers to execute arbitrary code via a long NLST command.
network
low complexity
ibm CWE-119
critical
10.0
2010-05-20 CVE-2010-1039 USE of Externally-Controlled Format String vulnerability in multiple products
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and earlier; IBM VIOS 2.1, 1.5, and earlier; NFS/ONCplus B.11.31_09 and earlier on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote attackers to execute arbitrary code via an RPC request containing format string specifiers in an invalid directory name.
network
low complexity
hp ibm sgi CWE-134
critical
10.0
2003-06-16 CVE-2003-0285 Unspecified vulnerability in IBM AIX
IBM AIX 5.2 and earlier distributes Sendmail with a configuration file (sendmail.cf) with the (1) promiscuous_relay, (2) accept_unresolvable_domains, and (3) accept_unqualified_senders features enabled, which allows Sendmail to be used as an open mail relay for sending spam e-mail.
network
low complexity
ibm
5.0
2002-02-13 CVE-2001-1079 Denial-Of-Service vulnerability in IBM AIX 3.2.0
create_keyfiles in PSSP 3.2 with DCE 3.1 authentication on AIX creates keyfile directories with world-writable permissions, which could allow a local user to delete key files and cause a denial of service.
local
low complexity
ibm
3.6
2000-12-10 CVE-2000-1222 Unspecified vulnerability in IBM AIX
AIX sysback before 4.2.1.13 uses a relative path to find and execute the hostname program, which allows local users to gain privileges by modifying the path to point to a malicious hostname program.
local
low complexity
ibm
7.2
1994-07-20 CVE-1999-1552 Unspecified vulnerability in IBM AIX
dpsexec (DPS Server) when running under XDM in IBM AIX 3.2.5 and earlier does not properly check privileges, which allows local users to overwrite arbitrary files and gain privileges.
local
low complexity
ibm
7.2