Vulnerabilities > IBM > AIX > Medium

DATE CVE VULNERABILITY TITLE RISK
2000-05-24 CVE-2000-0441 Unspecified vulnerability in IBM AIX
Vulnerability in AIX 3.2.x and 4.x allows local users to gain write access to files on locally or remotely mounted AIX filesystems.
network
low complexity
ibm
5.0
1999-05-06 CVE-1999-1079 Unspecified vulnerability in IBM AIX
Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program.
local
low complexity
ibm
4.6
1998-04-08 CVE-1999-0010 Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
network
low complexity
data-general isc ibm nec netbsd redhat sco sun
5.0
1998-03-18 CVE-1999-1075 Unspecified vulnerability in IBM AIX 4.1.5
inetd in AIX 4.1.5 dynamically assigns a port N when starting ttdbserver (ToolTalk server), but also inadvertently listens on port N-1 without passing control to ttdbserver, which allows remote attackers to cause a denial of service via a large number of connections to port N-1, which are not properly closed by inetd.
network
low complexity
ibm
5.0
1998-02-01 CVE-1999-0087 Unspecified vulnerability in IBM AIX 4.1/4.2/4.3
Denial of service in AIX telnet can freeze a system and prevent users from accessing the server.
network
low complexity
ibm
5.0
1998-01-08 CVE-1999-0086 Unspecified vulnerability in IBM AIX
AIX routed allows remote users to modify sensitive files.
network
low complexity
ibm
5.0
1998-01-05 CVE-1999-0513 ICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denial of service.
network
low complexity
sun digital ibm freebsd linux hp netbsd
5.0
1997-10-29 CVE-1999-0094 Unspecified vulnerability in IBM AIX
AIX piodmgrsu command allows local users to gain additional group privileges.
local
low complexity
ibm
4.6
1997-08-13 CVE-1999-0024 DNS cache poisoning via BIND, by predictable query IDs.
network
low complexity
isc sco sun nec ibm bsdi
5.0
1997-08-01 CVE-1999-0566 Unspecified vulnerability in IBM AIX
An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities.
network
low complexity
ibm
5.0